Reference Hub3
Application of Cyber Security in Emerging C4ISR Systems

Application of Cyber Security in Emerging C4ISR Systems

Ashfaq Ahmad Malik, Athar Mahboob, Adil Khan, Junaid Zubairi
ISBN13: 9781609608514|ISBN10: 1609608518|EISBN13: 9781609608521
DOI: 10.4018/978-1-60960-851-4.ch012
Cite Chapter Cite Chapter

MLA

Malik, Ashfaq Ahmad, et al. "Application of Cyber Security in Emerging C4ISR Systems." Cyber Security Standards, Practices and Industrial Applications: Systems and Methodologies, edited by Junaid Ahmed Zubairi and Athar Mahboob, IGI Global, 2012, pp. 223-258. https://doi.org/10.4018/978-1-60960-851-4.ch012

APA

Malik, A. A., Mahboob, A., Khan, A., & Zubairi, J. (2012). Application of Cyber Security in Emerging C4ISR Systems. In J. Zubairi & A. Mahboob (Eds.), Cyber Security Standards, Practices and Industrial Applications: Systems and Methodologies (pp. 223-258). IGI Global. https://doi.org/10.4018/978-1-60960-851-4.ch012

Chicago

Malik, Ashfaq Ahmad, et al. "Application of Cyber Security in Emerging C4ISR Systems." In Cyber Security Standards, Practices and Industrial Applications: Systems and Methodologies, edited by Junaid Ahmed Zubairi and Athar Mahboob, 223-258. Hershey, PA: IGI Global, 2012. https://doi.org/10.4018/978-1-60960-851-4.ch012

Export Reference

Mendeley
Favorite

Abstract

C4ISR stands for Command, Control, Communications, Computers, Intelligence, Surveillance & Reconnaissance. C4ISR systems are primarily used by organizations in the defense sector. However, they are also increasingly being used by civil sector organizations such as railways, airports, oil, and gas exploration departments. The C4ISR system is a system of systems and it can also be termed as network of networks and works on similar principles as the Internet. Hence it is vulnerable to similar attacks called cyber attacks and warrants appropriate security measures to save it from these attacks or to recover if the attack succeeds. All of the measures put in place to achieve this are called cyber security of C4ISR systems. This chapter gives an overview of C4ISR systems focusing on the perspective of cyber security warranting information assurance.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.