Show simple item record

dc.contributor.authorHenselmann, Gerhard
dc.contributor.authorLehto, Martti
dc.contributor.editorCruz, Tiago
dc.contributor.editorSimoes, Paulo
dc.date.accessioned2020-01-08T11:53:12Z
dc.date.available2020-01-08T11:53:12Z
dc.date.issued2019
dc.identifier.citationHenselmann, G., & Lehto, M. (2019). Where Cyber Meets the Electromagnetic Spectrum. In T. Cruz, & P. Simoes (Eds.), <i>ECCWS 2019 : Proceedings of the 18th European Conference on Cyber Warfare and Security</i> (pp. 209-218). Academic Conferences International. Proceedings of the European conference on information warfare and security.
dc.identifier.otherCONVID_32273822
dc.identifier.urihttps://jyx.jyu.fi/handle/123456789/67168
dc.description.abstractCyber linked with Information Technology, computers and the internet are the most commonly understood potential threats that everybody is aware of nowadays. In the case of National Cyber Strategy most efforts are given to these potential battlefields and threats. But is it enough to stay with these paradigms? Cyber warfare will look for utmost effects for chaos and misalignment of economy and therefore we cannot exclude the facts, that there is a potential threat also possible in the cut volumes between the information technology, the electromagnetic spectrum and its linked infrastructure and processes. We understand the technology for mobile telecommunications and data transfer, as the providers and linked business models are transparent and an open source and therefore a potential threat in the sense of cyber-attacks. All these services are based on the message transfer in the Electromagnetic Spectrum (EMS). It will be more challenging to enter in secured networks and modern data communication protected by encrypted and secured data links, hardened equipment and architecture. But as those systems, like the avionics and communication subsystems in airborne vehicles and commercial aircrafts are highly interlinked and interoperable based on data networks, it will be necessary to understand the architecture and weaknesses in detail. Of course, these principles are not fixed only to the airborne platforms and relevant applications; you may find the same technical pandemics in data transmission and data engineering in the physics of any data transfer chain, like satellite communication, radio transmission links. The paper will discuss the technical background in principle and identify potential weaknesses in aviation electromagnetic spectrum. We propose measures for attention and the implementation of relevant procedures and quality in order to overcome bottlenecks and grey area dull which helps the opponents to weaken society and open a sideshow for conflicts introduced by “simple cyber threat handling”. © 2019, Curran Associates Inc. All rights reserved.en
dc.format.extent884
dc.format.mimetypeapplication/pdf
dc.languageeng
dc.language.isoeng
dc.publisherAcademic Conferences International
dc.relation.ispartofECCWS 2019 : Proceedings of the 18th European Conference on Cyber Warfare and Security
dc.relation.ispartofseriesProceedings of the European conference on information warfare and security
dc.rightsIn Copyright
dc.subject.otheraeronautics
dc.subject.otheravionics
dc.subject.othercyber warfare
dc.subject.otherelectromagnetic spectrum
dc.subject.otherelectronic warfare
dc.titleWhere Cyber Meets the Electromagnetic Spectrum
dc.typeconferenceObject
dc.identifier.urnURN:NBN:fi:jyu-202001081095
dc.contributor.laitosInformaatioteknologian tiedekuntafi
dc.contributor.laitosFaculty of Information Technologyen
dc.contributor.oppiaineTietotekniikkafi
dc.contributor.oppiaineMathematical Information Technologyen
dc.type.urihttp://purl.org/eprint/type/ConferencePaper
dc.relation.isbn978-1-912764-28-0
dc.type.coarhttp://purl.org/coar/resource_type/c_5794
dc.description.reviewstatuspeerReviewed
dc.format.pagerange209-218
dc.relation.issn2048-8602
dc.type.versionpublishedVersion
dc.rights.copyright© The Author(s) 2019
dc.rights.accesslevelopenAccessfi
dc.relation.conferenceEuropean Conference on Cyber Warfare and Security
dc.subject.ysoelektroninen sodankäynti
dc.subject.ysokybersodankäynti
dc.subject.ysolentotekniikka
dc.subject.ysokyberturvallisuus
dc.subject.ysosähkömagneettinen säteily
dc.subject.ysolangaton tiedonsiirto
dc.format.contentfulltext
jyx.subject.urihttp://www.yso.fi/onto/yso/p10373
jyx.subject.urihttp://www.yso.fi/onto/yso/p27779
jyx.subject.urihttp://www.yso.fi/onto/yso/p16229
jyx.subject.urihttp://www.yso.fi/onto/yso/p26189
jyx.subject.urihttp://www.yso.fi/onto/yso/p1298
jyx.subject.urihttp://www.yso.fi/onto/yso/p5445
dc.rights.urlhttp://rightsstatements.org/page/InC/1.0/?language=en
dc.type.okmA4


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record

In Copyright
Except where otherwise noted, this item's license is described as In Copyright