A Review on C3I Systems' Security: Vulnerabilities, Attacks, and Countermeasures

by   Hussain Ahmad, et al.

Command, Control, Communication, and Intelligence (C3I) system is a kind of system-of-system that integrates computing machines, sensors, and communication networks. C3I systems are increasingly used in critical civil and military operations for achieving information superiority, assurance, and operational efficacy. C3I systems are no exception to the traditional systems facing widespread cyber-threats. However, the sensitive nature of the application domain (e.g., military operations) of C3I systems makes their security a critical concern. For instance, a cyber-attack on military installations can have detrimental impacts on national security. Therefore, in this paper, we review the state-of-the-art on the security of C3I systems. In particular, this paper aims to identify the security vulnerabilities, attack vectors, and countermeasures for C3I systems. We used the well-known systematic literature review method to select and review 77 studies on the security of C3I systems. Our review enabled us to identify 27 vulnerabilities, 22 attack vectors, and 62 countermeasures for C3I systems. This review has also revealed several areas for future research and identified key lessons with regards to C3I systems' security.



There are no comments yet.


page 2

page 8

page 9

page 16


Challenges towards Building an effective Cyber Security Operations Centre

The increasing dependency of modern society on IT systems and infrastruc...

A framework for effective corporate communication after cyber security incidents

A major cyber security incident can represent a cyber crisis for an orga...

Profiling the Cybercriminal: A Systematic Review of Research

As cybercrime becomes one of the most significant threats facing society...

An In-Depth Security Assessment of Maritime Container Terminal Software Systems

Attacks on software systems occur world-wide on a daily basis targeting ...

An Evasion Attack against ML-based Phishing URL Detectors

Background: Over the year, Machine Learning Phishing URL classification ...

Acoustic Denial of Service Attacks on HDDs

Among storage components, hard disk drives (HDDs) have become the most c...
This week in AI

Get the week's most popular data science and artificial intelligence research sent straight to your inbox every Saturday.