Enabling the Net-Centric Systems Model through Adapting Enterprise Security Services to the Mobile Users

被引:0
|
作者
Farroha, Bassam S. [1 ]
Farroha, Deborah L. [1 ]
机构
[1] U.S. Dept. of Defense, Ft Meade, MD, United States
关键词
Enterprise security - Malwares - Mitigation techniques - Mobile users - Net-centric systems - Risk mitigation - Security services - Sharing information - System models - Tacticals;
D O I
10.1002/j.2334-5837.2011.tb01314.x
中图分类号
学科分类号
摘要
This paper investigates the requirements, technologies and risk mitigation techniques for securely sharing information with the tactical Mobile users while protecting the data and the information systems from intruders and malware. The systems engineering concepts applied to the design and development of the Enterprise need to include the security criteria and mitigating techniques to handle Mobility, and reliance on Cloud services to obtain the required data and services. A strong emphasis is placed on analyzing secure data sharing outside its security domain with services, agencies, coalition partners and state/local authorities. There has been an increased demand for multiple levels of secretive data at the tactical edge; however the threat level at that point has been increasing dramatically compared to the enterprise environment. The next generation information systems need to eliminate the stovepipe architectures and open the doors to share information across traditional and non-traditional domain boundaries, while dealing with the increased threats stemming from wireless attacks, virtualized resources, and limited investment. This leads the sponsoring organization to think in terms of System of Systems when developing independent capabilities that needs to operate as consumers or producers with other systems. Agility in development is also paramount in today's budget sensitive and fluid requirements environments. © 2011 The Authors.
引用
收藏
页码:3322 / 3337
相关论文
共 11 条