Page 104 - Cyber Defense eMagazine January 2023
P. 104

Key words: Technology, Intelligence, Cyber Security, Investigation, Cryptology, etc.



            Introduction

            Hacking attack vector surface has overwhelmed modern information-communication systems causing
            risk to  people,  businesses  and  critical  infrastructure. Ongoing cyber  landscape faces  up certain  skill
            shortage as there are yet too many challenges that should be overcome. Defense industry is constantly
            several decades ahead from civilian community as it can be comparable with space research programs
            which  cope  with  cutting-edge  solutions.  Even  military community  of  today  is  not fully  protected  from
                                                       th
            ongoing threats as it deals with products of 4  industrial revolution. Modern tendencies across the globe
            are to make smart technology and such a trend is even present with army industry. It’s well-known that
            military assets will apply some level of protection to their communication, information exchange and
            storage systems and in such a sense it’s possible to talk about highly sophisticated cryptographic projects
            which can provide some degree of assurance to those critical data managements. Cryptology is a practice
            that can be distinguished into two branches being cryptography and cryptanalysis. Both areas are more
            than needed for security of military systems. Cyber technologies include computers, internet and mobile
            advancements which are very vulnerable to cyber attacks. Current hacking tools need IP address in order
            to  make  breach  and  take  control  over  those  innovations.  Also,  cyber  attacks  are  not  only  threat  to
            network’s devices, but mostly to communication channels which need quite strong end-to-end, as well
            as link encryption. That military doctrine is already well-developed as there was always need to protect
            exchanged  findings.  Beginnings  of  first  cryptographic  tools  go  back  to  ancient  times  and  usage  of
            encryption with Spartan warriors. True breakthrough of encryption which is known nowadays started with
                                                                                                      rd
            World  War  2  bringing  with  so  real  explosion  of  digital  technologies.  That  was  time  of  3   industrial
            revolution  and  even  today  industry  4.0.  relies  on  such  discoveries  as  modern  technologies  are  just
            transformation of what was made before.

            Imperative of progress is to offer something new and better in regards to pervious approaches. Current
            industrial  boom  gains  huge  popularity  as  it  transfers  communication  and  object’s  experience  to  web
            environment providing pretty cost-effective solutions which can be assumed as advantage in comparation
            with what was used before. Such a demand is put in front of ongoing army community as solutions in
            defense industry must be functional, as well as inexpensive. Similar requirement is engaged with entire
            engineering landscape as even civilians will reject something being less convenient to them. World is
            becoming consumer society and if majority is not happy they will seek change. Change can be positive,
            negative and neutral and only positive changes can guarantee progress and prosperity. In other words,
            once it was approached some project all its pluses and minuses must be reviewed in order to explain to
            such decision makers approve budgeting to those needs. Engineering always looks for optimal choice
            as it must satisfy both – technological and economical requirements. Similar case is with defense industry
            as  tax  payers  worldwide  will  not  be  willing  to  support  something  extremely  pricing  no  matter  how
            sophisticated that solution is. It appears both – civilian and defense industries cope with more or less
            similar challenges. For instance, army members mostly apply satellite communication in their everyday
            routine, but such a technological service is very expensive and for that reason there is appeal to shift on
            something cheaper as cordless web connection is. Main concern with such an internet communication is
            its range and coverage which means only one factor is met which is cost-effectiveness, while functionality





            Cyber Defense eMagazine – January 2023 Edition                                                                                                                                                                                                       104
            Copyright © 2023, Cyber Defense Magazine. All rights reserved worldwide.
   99   100   101   102   103   104   105   106   107   108   109