Where Cyber Meets the Electromagnetic Spectrum
Henselmann, G., & Lehto, M. (2019). Where Cyber Meets the Electromagnetic Spectrum. In T. Cruz, & P. Simoes (Eds.), ECCWS 2019 : Proceedings of the 18th European Conference on Cyber Warfare and Security (pp. 209-218). Academic Conferences International. Proceedings of the European conference on information warfare and security.
Julkaistu sarjassa
Proceedings of the European conference on information warfare and securityPäivämäärä
2019Tekijänoikeudet
© The Author(s) 2019
Cyber linked with Information Technology, computers and the internet are the most commonly understood potential threats that everybody is aware of nowadays. In the case of National Cyber Strategy most efforts are given to these potential battlefields and threats. But is it enough to stay with these paradigms? Cyber warfare will look for utmost effects for chaos and misalignment of economy and therefore we cannot exclude the facts, that there is a potential threat also possible in the cut volumes between the information technology, the electromagnetic spectrum and its linked infrastructure and processes. We understand the technology for mobile telecommunications and data transfer, as the providers and linked business models are transparent and an open source and therefore a potential threat in the sense of cyber-attacks. All these services are based on the message transfer in the Electromagnetic Spectrum (EMS). It will be more challenging to enter in secured networks and modern data communication protected by encrypted and secured data links, hardened equipment and architecture. But as those systems, like the avionics and communication subsystems in airborne vehicles and commercial aircrafts are highly interlinked and interoperable based on data networks, it will be necessary to understand the architecture and weaknesses in detail. Of course, these principles are not fixed only to the airborne platforms and relevant applications; you may find the same technical pandemics in data transmission and data engineering in the physics of any data transfer chain, like satellite communication, radio transmission links. The paper will discuss the technical background in principle and identify potential weaknesses in aviation electromagnetic spectrum. We propose measures for attention and the implementation of relevant procedures and quality in order to overcome bottlenecks and grey area dull which helps the opponents to weaken society and open a sideshow for conflicts introduced by “simple cyber threat handling”. © 2019, Curran Associates Inc. All rights reserved.
...
Julkaisija
Academic Conferences InternationalEmojulkaisun ISBN
978-1-912764-28-0Konferenssi
European Conference on Cyber Warfare and SecurityKuuluu julkaisuun
ECCWS 2019 : Proceedings of the 18th European Conference on Cyber Warfare and SecurityISSN Hae Julkaisufoorumista
2048-8602Asiasanat
Julkaisu tutkimustietojärjestelmässä
https://converis.jyu.fi/converis/portal/detail/Publication/32273822
Metadata
Näytä kaikki kuvailutiedotKokoelmat
Lisenssi
Samankaltainen aineisto
Näytetään aineistoja, joilla on samankaltainen nimeke tai asiasanat.
-
Non-Kinetic Warfare : The New Game Changer in the Battle Space
Lehto, Martti; Henselmann, Gerhard (Academic Conferences International, 2020)Cyber warfare, information warfare, electronic warfare, command and control warfare, spectrum warfare. Those are only some of the names by which researchers and military experts describe their offensive and defensive ... -
Enhancing detection & identification of hybrid warfare from cyber security perspective
Lindfors, Tomi (2022)Hybrid warfare has surfaced in recent years in media and scientific literature, as the western world has noticed its challenges and possibilities. Hybrid warfare and its operations are by nature constantly evolving and ... -
On Apache Log4j2 Exploitation in Aeronautical, Maritime, and Aerospace Communication
Juvonen, Artturi; Costin, Andrei; Turtiainen, Hannu; Hämäläinen, Timo (Institute of Electrical and Electronics Engineers (IEEE), 2022)Apache Log4j2 is a prevalent logging library for Java-based applications. In December 2021, several critical and high-impact software vulnerabilities, including CVE-2021-44228, were publicly disclosed, enabling remote code ... -
Electromagnetic scattering solutions for digital signal processing
Blackledge, Jonathan (University of Jyväskylä, 2010) -
Cyber Operations in Ukraine : Emerging Patterns in Cases
Takamaa, Markus; Lehto, Martti (Academic Conferences International Ltd, 2024)The Ukrainian state has been a target of cyber-related incidents since the annexation of Crimea in 2014. Cyberattacks have targeted Ukrainian critical infrastructure, government offices, and several public and private ...
Ellei toisin mainittu, julkisesti saatavilla olevia JYX-metatietoja (poislukien tiivistelmät) saa vapaasti uudelleenkäyttää CC0-lisenssillä.