The University of Southampton
University of Southampton Institutional Repository

Electronic Security Implications of NEC: A Tactical Battlefield Scenario

Electronic Security Implications of NEC: A Tactical Battlefield Scenario
Electronic Security Implications of NEC: A Tactical Battlefield Scenario
In [1] three principal themes are identified by the UK MoD (Ministry of Defence) in order to deliver the vision of NEC (Network Enabled Capability): Networks, People and Information. It is the security of information, which is discussed in this article. The drive towards NEC is due to many factors; one defining factor is to provide an increase in operational tempo in effect placing one ahead of their enemy in terms of acting within their OODA (Observe, Orient, Decide, Act) loop. However as technical and procedural systems are being advanced to achieve the vision of NEC, what impact does this have on the traditional information security triangle, of preserving the confidentiality, integrity and availability of information? And how does this influence current security engineering and accreditation practices, particularly in light of the proliferation problem? This article describes research conducted into answering these questions, building upon the findings of the NITEworks® [2] ISTAR (Intelligence, Surveillance, Target Acquisition and Reconnaissance) Theme studies and focusing on a tactical battlefield scenario. This scenario relates to the IFPA (Indirect Fire Precision Attack) [3] project where the efficient synchronisation of potentially numerous sources of information is required, providing real-time decisions and delivery of effects, in accordance with the requirements of NEC. It is envisaged that the IFPA systems will consist of numerous sub-systems each of which will provide a unique effecting capability to the UK army with differing levels of speed, accuracy and range.
Military, Information Security and Time Sensitive Targetting
110-113
Hayat, MZ
7db20277-35e4-47ab-a82f-be588f555fe3
Reeve, JS
dd909010-7d44-44ea-83fe-a09e4d492618
Boutle, CJ
5f2c8159-668d-4093-9138-8674635ff858
Kincaid, Bill
96fc4b0a-0f42-49ea-88c6-35af8157688c
Hayat, MZ
7db20277-35e4-47ab-a82f-be588f555fe3
Reeve, JS
dd909010-7d44-44ea-83fe-a09e4d492618
Boutle, CJ
5f2c8159-668d-4093-9138-8674635ff858
Kincaid, Bill
96fc4b0a-0f42-49ea-88c6-35af8157688c

Hayat, MZ, Reeve, JS and Boutle, CJ , Kincaid, Bill (ed.) (2006) Electronic Security Implications of NEC: A Tactical Battlefield Scenario. RUSI Defence Systems Journal, 9 (2), 110-113.

Record type: Article

Abstract

In [1] three principal themes are identified by the UK MoD (Ministry of Defence) in order to deliver the vision of NEC (Network Enabled Capability): Networks, People and Information. It is the security of information, which is discussed in this article. The drive towards NEC is due to many factors; one defining factor is to provide an increase in operational tempo in effect placing one ahead of their enemy in terms of acting within their OODA (Observe, Orient, Decide, Act) loop. However as technical and procedural systems are being advanced to achieve the vision of NEC, what impact does this have on the traditional information security triangle, of preserving the confidentiality, integrity and availability of information? And how does this influence current security engineering and accreditation practices, particularly in light of the proliferation problem? This article describes research conducted into answering these questions, building upon the findings of the NITEworks® [2] ISTAR (Intelligence, Surveillance, Target Acquisition and Reconnaissance) Theme studies and focusing on a tactical battlefield scenario. This scenario relates to the IFPA (Indirect Fire Precision Attack) [3] project where the efficient synchronisation of potentially numerous sources of information is required, providing real-time decisions and delivery of effects, in accordance with the requirements of NEC. It is envisaged that the IFPA systems will consist of numerous sub-systems each of which will provide a unique effecting capability to the UK army with differing levels of speed, accuracy and range.

Text
RUSI_pi_nec2.pdf - Other
Download (176kB)

More information

Published date: November 2006
Keywords: Military, Information Security and Time Sensitive Targetting
Organisations: EEE

Identifiers

Local EPrints ID: 262274
URI: http://eprints.soton.ac.uk/id/eprint/262274
PURE UUID: fe75aabd-9c01-4203-8bfa-2210d1facf1a

Catalogue record

Date deposited: 10 Apr 2006
Last modified: 14 Mar 2024 07:08

Export record

Contributors

Author: MZ Hayat
Author: JS Reeve
Author: CJ Boutle
Editor: Bill Kincaid

Download statistics

Downloads from ePrints over the past year. Other digital versions may also be available to download e.g. from the publisher's website.

View more statistics

Atom RSS 1.0 RSS 2.0

Contact ePrints Soton: eprints@soton.ac.uk

ePrints Soton supports OAI 2.0 with a base URL of http://eprints.soton.ac.uk/cgi/oai2

This repository has been built using EPrints software, developed at the University of Southampton, but available to everyone to use.

We use cookies to ensure that we give you the best experience on our website. If you continue without changing your settings, we will assume that you are happy to receive cookies on the University of Southampton website.

×