近期网络事件和对武装部队可能产生的影响#6

ID:25589

大小:0.25 MB

页数:7页

时间:2022-12-01

金币:15

上传者:战必胜
Recent Cyber Events and Possible
Implications for Armed Forces
#6 October 2020
About this paper
This paper is the collaborative view of NATO CCDCOE researchers highlighting the potential effects
on the military of current events and of developments in cyberspace during the previous month,
based on publicly available information. It does not set out to be exhaustive. While the authors have
made every effort to describe events from a perspective relevant to NATO and partner nations, there
may be national and regional differences which this paper does not address.
The authors of this paper are independent researchers at the NATO CCDCOE; they do not represent
NATO, nor does this paper reflect NATO’s position. The aim of the paper is not to replace information
about vulnerabilities and incidents provided by CSIRTs and providers of CIS products and services.
1. Targeted threats against the
military and national security
Wearable tokens can make
authentication less distracting
’The U.S. Army’s wearable authentication
tokens intended for the tactical environment
could be used for nontactical purposes, such
as accessing strategic-level systems,
enterprise networks and medical systems,
researchers say. (AFCEA Signal, September
2020)
Communication and information systems
called tactical networks are essential for
supporting the modern armed forces. They
aim to provide an extensive range of services,
such as: command, control, communications,
computers, cyber, intelligence, surveillance
and reconnaissance (C5ISR). Access to that
system has been quite difficult since soldiers
need to use a keyboard to log in and out when
needed, which keeps them occupied by the
keyboard and not with the battlefield. Since
2017, the US has been developing wearable
authentication
1
which seeks to be useable for
the soldier in the field, but is also being
considered for use outside the tactical
environment.
Wearable identity authentication and
authorisation technology will be based on
1
Army Times: Wearable ID to give soldiers access
to networks downrange, do more than smartcards
wireless technology built into a small token
that can be attached to the uniform or worn as
a wristband. A second factor, such as a
personal identification number or a fingerprint,
will complement the token when logging in.
The wearable technology will allow soldiers to
be more focused to the battlefield than on the
keyboard since automatic logout is provided
and the use of the keyboard will only be
needed for the first login or when a soldier
comes back to the equipment. However, this
solution is raising some concerns and
challenges. For example: secure wireless
connection, protection of bio-metrical data,
upgrades and updates of equipment and
losing the wearable access card. Therefore, it
is necessary to make a thorough risk
assessment and to mitigate the risks
identified.
Belfer National Cyber Power Index
(NCPI) released
In contrast to existing cyber-related indices,
we believe there is no single measure of cyber
power. Cyber Power is made up of multiple
components and should be considered in the
context of a country’s national objectives.’
(Belfer Center, September 2020)
资源描述:

当前文档最多预览五页,下载文档查看全文

此文档下载收益归作者所有

当前文档最多预览五页,下载文档查看全文
温馨提示:
1. 部分包含数学公式或PPT动画的文件,查看预览时可能会显示错乱或异常,文件下载后无此问题,请放心下载。
2. 本文档由用户上传,版权归属用户,天天文库负责整理代发布。如果您对本文档版权有争议请及时联系客服。
3. 下载前请仔细阅读文档内容,确认文档内容符合您的需求后进行下载,若出现内容与标题不符可向本站投诉处理。
4. 下载文档时可能由于网络波动等原因无法下载或下载错误,付费完成后未能成功下载的用户请联系客服处理。
关闭