ResearchSpace

Securing military information systems on public infrastructure

Show simple item record

dc.contributor.author Botha, P
dc.contributor.author Vawda, Shazia
dc.contributor.author Ramadeen, P
dc.contributor.author Terlunen, A
dc.date.accessioned 2015-11-12T07:37:44Z
dc.date.available 2015-11-12T07:37:44Z
dc.date.issued 2015-03
dc.identifier.citation otha, P, Vawda, S, Ramadeen, P, and Terlunen, A. 2015. Securing military information systems on public infrastructure. In: Proceedings of the 10th International Conference on Cyber Warfare and Security (ICCWS) 2015, Skukuza, Kruger National Park, 24-25 March 2015 en_US
dc.identifier.uri http://hdl.handle.net/10204/8262
dc.description Abstract only. The full-text of this paper is published in the Proceedings of the 10th International Conference on Cyber Warfare and Security (ICCWS) 2015, Skukuza, Kruger National Park, 24-25 March 2015 en_US
dc.description.abstract Military information systems require high levels of security to protect sensitive information within these systems. Encrypted private networks are a common method of securing such systems. However these networks are not always available or practical to set up in time for scenarios which require real time information. This may force communications to utilise public infrastructure. Securing communications for military mobile and Web based systems over public networks poses a greater challenge compared to private encrypted networks. Several security mechanisms from commercial enterprise and social networking systems were adopted and customised in order to secure Cmore, a Web based real time distributed command and control system developed by the Council for Scientific and Industrial Research (CSIR). This paper highlights the security architecture of Cmore and discusses some of the successes and challenges encountered during the design and development of the Cmore architecture. Cmore has been successfully utilised and tested in several field experiments and operations. The resulting security architecture can be applied to other Web and mobile systems. en_US
dc.language.iso en en_US
dc.relation.ispartofseries Worklist;14591
dc.subject Information security en_US
dc.subject Military information systems en_US
dc.subject Web systems en_US
dc.subject Mobile systems en_US
dc.subject Cyber warfare en_US
dc.subject Cyber-attacks en_US
dc.title Securing military information systems on public infrastructure en_US
dc.type Conference Presentation en_US
dc.identifier.apacitation Botha, P., Vawda, S., Ramadeen, P., & Terlunen, A. (2015). Securing military information systems on public infrastructure. http://hdl.handle.net/10204/8262 en_ZA
dc.identifier.chicagocitation Botha, P, Shazia Vawda, P Ramadeen, and A Terlunen. "Securing military information systems on public infrastructure." (2015): http://hdl.handle.net/10204/8262 en_ZA
dc.identifier.vancouvercitation Botha P, Vawda S, Ramadeen P, Terlunen A, Securing military information systems on public infrastructure; 2015. http://hdl.handle.net/10204/8262 . en_ZA
dc.identifier.ris TY - Conference Presentation AU - Botha, P AU - Vawda, Shazia AU - Ramadeen, P AU - Terlunen, A AB - Military information systems require high levels of security to protect sensitive information within these systems. Encrypted private networks are a common method of securing such systems. However these networks are not always available or practical to set up in time for scenarios which require real time information. This may force communications to utilise public infrastructure. Securing communications for military mobile and Web based systems over public networks poses a greater challenge compared to private encrypted networks. Several security mechanisms from commercial enterprise and social networking systems were adopted and customised in order to secure Cmore, a Web based real time distributed command and control system developed by the Council for Scientific and Industrial Research (CSIR). This paper highlights the security architecture of Cmore and discusses some of the successes and challenges encountered during the design and development of the Cmore architecture. Cmore has been successfully utilised and tested in several field experiments and operations. The resulting security architecture can be applied to other Web and mobile systems. DA - 2015-03 DB - ResearchSpace DP - CSIR KW - Information security KW - Military information systems KW - Web systems KW - Mobile systems KW - Cyber warfare KW - Cyber-attacks LK - https://researchspace.csir.co.za PY - 2015 T1 - Securing military information systems on public infrastructure TI - Securing military information systems on public infrastructure UR - http://hdl.handle.net/10204/8262 ER - en_ZA


Files in this item

This item appears in the following Collection(s)

Show simple item record