Application of Cyber Security in Emerging C4ISR Systems

Application of Cyber Security in Emerging C4ISR Systems

Ashfaq Ahmad Malik, Athar Mahboob, Adil Khan, Junaid Zubairi
ISBN13: 9781466647077|ISBN10: 1466647078|EISBN13: 9781466647084
DOI: 10.4018/978-1-4666-4707-7.ch086
Cite Chapter Cite Chapter

MLA

Malik, Ashfaq Ahmad, et al. "Application of Cyber Security in Emerging C4ISR Systems." Crisis Management: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, IGI Global, 2014, pp. 1705-1738. https://doi.org/10.4018/978-1-4666-4707-7.ch086

APA

Malik, A. A., Mahboob, A., Khan, A., & Zubairi, J. (2014). Application of Cyber Security in Emerging C4ISR Systems. In I. Management Association (Ed.), Crisis Management: Concepts, Methodologies, Tools, and Applications (pp. 1705-1738). IGI Global. https://doi.org/10.4018/978-1-4666-4707-7.ch086

Chicago

Malik, Ashfaq Ahmad, et al. "Application of Cyber Security in Emerging C4ISR Systems." In Crisis Management: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, 1705-1738. Hershey, PA: IGI Global, 2014. https://doi.org/10.4018/978-1-4666-4707-7.ch086

Export Reference

Mendeley
Favorite

Abstract

C4ISR stands for Command, Control, Communications, Computers, Intelligence, Surveillance & Reconnaissance. C4ISR systems are primarily used by organizations in the defense sector. However, they are also increasingly being used by civil sector organizations such as railways, airports, oil, and gas exploration departments. The C4ISR system is a system of systems and it can also be termed as network of networks and works on similar principles as the Internet. Hence it is vulnerable to similar attacks called cyber attacks and warrants appropriate security measures to save it from these attacks or to recover if the attack succeeds. All of the measures put in place to achieve this are called cyber security of C4ISR systems. This chapter gives an overview of C4ISR systems focusing on the perspective of cyber security warranting information assurance.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.