Architecture

The Impact of Architecture and Interoperability on Information Warfare Systems

ABSTRACT

Interoperability of hardware, software systems, and data has been an issue since the inception of those terms. With the proliferation of, and our growing dependence upon Information Warfare (IW), Command and Control Warfare (C2W), and Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance (C4ISR) systems, interoperability has become a significant concern and the subject of much debate. Interoperability is one of several well-defined attributes of information systems. But in order to produce a well-behaved system containing these attributes an architecture, and architectural concepts must first be developed and followed.

I Want My Smartphone. I Want It Now. And I Want to Connect to Everything from Anywhere… Now!

ABSTRACT

Even the classified enterprise is going mobile. Trolls and Luddites cannot prevent it. But the bridge to be crossed to mobility nirvana (a secure, cheap, and user-beloved system) is still rickety with many places where one can fall into the chasm of lost data. The forces of malware, user sloth, shoddy component design, and poor system architecture are arrayed against safe passage. But one is not alone. Assisting the crossing are a number of laws requiring privacy and security measures, government programs that induce superior products, policies written for both public and private sector enterprises, standards bodies, and, most of all customers demanding security from vendors. This paper will look at the mobility mission, the threat to mobile, the secure enterprise architectures using defense in depth, the state of security in system components and how that is being improved through a number of efforts, and the impact of new technology.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Keywords

A

AI
APT

C

C2
C2S
CDX
CIA
CIP
CPS

D

DNS
DoD
DoS

I

IA
ICS

M

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

Registered Agent and Mailing Address

  • Journal of Information Warfare
  •  ArmisteadTEC
  • Dr Leigh Armistead, President
  • 1624 Wakefield Drive
  • Virginia Beach, VA 23455

 757.510.4574

 JIW@ArmisteadTec.com