28 August 2001 Defense and security of a wireless tactical network
Author Affiliations +
Recall the adage `a chain is as strong as its weakest link'- -a phrase that could serve as the official mantra of computer security. Operating Systems are difficult system to administer because it is not only complex and cantankerous but also hard to secure. They are enormous configurability, the fact that vendors don't ship secure systems, and that it requires significant amounts of time, resources, and expertise to safeguard a host are only some of the reasons that so many systems are insecure any type of network commercial or tactical. To compound the problem, like all modern operating systems it not only becomes less secure as time goes on (simply due to usage), but with the rapidly changing security field, it also requires considerably effort to stay abreast of the latest information. Army Research Labs is trying to address the security of the operating system in a tactical wireless environment. Through the use of public domain and/or commercial mans. ARL is evaluating monitoring, deployment, and auditing techniques to the wire commercial domain. By evaluating the wire domain ARL will determine what works and how they work in the tactical area. There are numerous ways to protect the wire/wireless network via public domain or commercial software.
© (2001) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Michael Younger, Stuart H. Young, "Defense and security of a wireless tactical network", Proc. SPIE 4395, Digital Wireless Communication III, (28 August 2001); doi: 10.1117/12.438289; https://doi.org/10.1117/12.438289


Cyber defense through hardware security
Proceedings of SPIE (May 09 2018)
Proceedings of SPIE (February 21 2001)
Survey of cyber security issues in smart grids
Proceedings of SPIE (April 28 2010)
Internet firewalls: questions and answers
Proceedings of SPIE (March 12 1996)

Back to Top