Electronic Security Implications of NEC: A Tactical Battlefield Scenario
Electronic Security Implications of NEC: A Tactical Battlefield Scenario
In [1] three principal themes are identified by the UK MoD (Ministry of Defence) in order to deliver the vision of NEC (Network Enabled Capability): Networks, People and Information. It is the security of information, which is discussed in this article. The drive towards NEC is due to many factors; one defining factor is to provide an increase in operational tempo in effect placing one ahead of their enemy in terms of acting within their OODA (Observe, Orient, Decide, Act) loop. However as technical and procedural systems are being advanced to achieve the vision of NEC, what impact does this have on the traditional information security triangle, of preserving the confidentiality, integrity and availability of information? And how does this influence current security engineering and accreditation practices, particularly in light of the proliferation problem? This article describes research conducted into answering these questions, building upon the findings of the NITEworks® [2] ISTAR (Intelligence, Surveillance, Target Acquisition and Reconnaissance) Theme studies and focusing on a tactical battlefield scenario. This scenario relates to the IFPA (Indirect Fire Precision Attack) [3] project where the efficient synchronisation of potentially numerous sources of information is required, providing real-time decisions and delivery of effects, in accordance with the requirements of NEC. It is envisaged that the IFPA systems will consist of numerous sub-systems each of which will provide a unique effecting capability to the UK army with differing levels of speed, accuracy and range.
Military, Information Security and Time Sensitive Targetting
110-113
Hayat, MZ
7db20277-35e4-47ab-a82f-be588f555fe3
Reeve, JS
dd909010-7d44-44ea-83fe-a09e4d492618
Boutle, CJ
5f2c8159-668d-4093-9138-8674635ff858
Kincaid, Bill
96fc4b0a-0f42-49ea-88c6-35af8157688c
November 2006
Hayat, MZ
7db20277-35e4-47ab-a82f-be588f555fe3
Reeve, JS
dd909010-7d44-44ea-83fe-a09e4d492618
Boutle, CJ
5f2c8159-668d-4093-9138-8674635ff858
Kincaid, Bill
96fc4b0a-0f42-49ea-88c6-35af8157688c
Hayat, MZ, Reeve, JS and Boutle, CJ
,
Kincaid, Bill
(ed.)
(2006)
Electronic Security Implications of NEC: A Tactical Battlefield Scenario.
RUSI Defence Systems Journal, 9 (2), .
Abstract
In [1] three principal themes are identified by the UK MoD (Ministry of Defence) in order to deliver the vision of NEC (Network Enabled Capability): Networks, People and Information. It is the security of information, which is discussed in this article. The drive towards NEC is due to many factors; one defining factor is to provide an increase in operational tempo in effect placing one ahead of their enemy in terms of acting within their OODA (Observe, Orient, Decide, Act) loop. However as technical and procedural systems are being advanced to achieve the vision of NEC, what impact does this have on the traditional information security triangle, of preserving the confidentiality, integrity and availability of information? And how does this influence current security engineering and accreditation practices, particularly in light of the proliferation problem? This article describes research conducted into answering these questions, building upon the findings of the NITEworks® [2] ISTAR (Intelligence, Surveillance, Target Acquisition and Reconnaissance) Theme studies and focusing on a tactical battlefield scenario. This scenario relates to the IFPA (Indirect Fire Precision Attack) [3] project where the efficient synchronisation of potentially numerous sources of information is required, providing real-time decisions and delivery of effects, in accordance with the requirements of NEC. It is envisaged that the IFPA systems will consist of numerous sub-systems each of which will provide a unique effecting capability to the UK army with differing levels of speed, accuracy and range.
Text
RUSI_pi_nec2.pdf
- Other
More information
Published date: November 2006
Keywords:
Military, Information Security and Time Sensitive Targetting
Organisations:
EEE
Identifiers
Local EPrints ID: 262274
URI: http://eprints.soton.ac.uk/id/eprint/262274
PURE UUID: fe75aabd-9c01-4203-8bfa-2210d1facf1a
Catalogue record
Date deposited: 10 Apr 2006
Last modified: 14 Mar 2024 07:08
Export record
Contributors
Author:
MZ Hayat
Author:
JS Reeve
Author:
CJ Boutle
Editor:
Bill Kincaid
Download statistics
Downloads from ePrints over the past year. Other digital versions may also be available to download e.g. from the publisher's website.
View more statistics