A Review on C3I Systems' Security: Vulnerabilities, Attacks, and Countermeasures

04/24/2021
by   Hussain Ahmad, et al.
0

Command, Control, Communication, and Intelligence (C3I) system is a kind of system-of-system that integrates computing machines, sensors, and communication networks. C3I systems are increasingly used in critical civil and military operations for achieving information superiority, assurance, and operational efficacy. C3I systems are no exception to the traditional systems facing widespread cyber-threats. However, the sensitive nature of the application domain (e.g., military operations) of C3I systems makes their security a critical concern. For instance, a cyber-attack on military installations can have detrimental impacts on national security. Therefore, in this paper, we review the state-of-the-art on the security of C3I systems. In particular, this paper aims to identify the security vulnerabilities, attack vectors, and countermeasures for C3I systems. We used the well-known systematic literature review method to select and review 77 studies on the security of C3I systems. Our review enabled us to identify 27 vulnerabilities, 22 attack vectors, and 62 countermeasures for C3I systems. This review has also revealed several areas for future research and identified key lessons with regards to C3I systems' security.

READ FULL TEXT

page 2

page 8

page 9

page 16

research
02/08/2022

Challenges towards Building an effective Cyber Security Operations Centre

The increasing dependency of modern society on IT systems and infrastruc...
research
09/19/2020

A framework for effective corporate communication after cyber security incidents

A major cyber security incident can represent a cyber crisis for an orga...
research
03/11/2020

Cyber Security Incident Handling, Warning and Response System for the European Critical Information Infrastructures (CyberSANE)

This paper aims to enhance the security and resilience of Critical Infor...
research
05/18/2020

An Evasion Attack against ML-based Phishing URL Detectors

Background: Over the year, Machine Learning Phishing URL classification ...
research
12/08/2022

A systematic literature review on Ransomware attacks

In the area of information technology, cybersecurity is critical. Inform...
research
07/02/2021

Reinforcement Learning for Feedback-Enabled Cyber Resilience

The rapid growth in the number of devices and their connectivity has enl...
research
04/24/2020

Cyber Security Behaviour In Organisations

This review explores the academic and policy literature in the context o...

Please sign up or login with your details

Forgot password? Click here to reset