King Saud University Repository >
King Saud University >
Science Colleges >
College of Computer and Information Sciences >
College of Computer and Information Sciences >

Please use this identifier to cite or link to this item: http://hdl.handle.net/123456789/15739

Title: Enhancing C4I security using threat modeling
Authors: Dr. Abdullah S. Alghamdi
Tazar Hussain
Gul Faraz Khan
Keywords: C4I system, security, threat modeling, vulnerabilities, NetCentric
Issue Date: 2010
Abstract: C4I (command, control, communications, computer and intelligence) system is a complex system of system which enables the military commander to achieve decision superiority by affecting adversary’s information, information based processes while protecting its one‘s own information systems. Due to the sensitivity of military information the security threats to C4I system are real and growing and security is a major challenge in order to maintain integrity, confidentiality, availability and accountability. Different Models and architectures e.g. DODAF, CDSA have been proposed which decompose the detail structure of C4I systems but these models do not provide mechanism to capture associated security risks and issues. Threat modeling is the process to understand different ways system can be attacked which helps towards secure system design and implement countermeasures. In this paper we identify how security can be modeled in top down manner e.g. from architecture level to low level so that countermeasures can be incorporated on system level rather than on little by little basis.. This paper also suggests that using threat modeling could help to eradicate or reduce the effect of evolving threats to C4I systems
URI: http://hdl.handle.net/123456789/15739
Appears in Collections:College of Computer and Information Sciences

Files in This Item:

File Description SizeFormat
Tazar Hussain.docx23.35 kBMicrosoft Word XMLView/Open

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.


DSpace Software Copyright © 2002-2009 MIT and Hewlett-Packard - Feedback