Contested Cyber Environment

Securing the Internet of Battlefield Things While Maintaining Value to the Warfighter

Abstract: 

The unremitting use of legacy systems continues to compound risks to the information management environment. As legacy systems become increasingly obsolete, they inefficiently con- sume valuable resources such as data, power, space, and manpower. Additionally, from a cyberse- curity and reliability perspective; systems which have reached the end of their intended life cycles are more susceptible to corruption or interruption of services.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Keywords

C

C2
C2S
CDX
CIA
CIP
CPS

I

IA
ICS

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

  • Journal of Information Warfare
    114 Ballard Street
    Yorktown, VA
    23690
  • 757.871.3949
  • jiw@gbpts.com