C4ISR system architectures are built on top of industry-standard interfaces (ethernet, video, CAN, USB and serial data) and open standards middleware technologies that enable a wide range of services, such as tactical (disruption-tolerant) voice and networking services, distribution of data and so on.
In this presentation, we review the ever-growing threats and advanced protection means, including the post-quantum cryptography for public-key algorithms. Moreover, we outline the specific assurance requirements, in order to ensure a sufficient confidence that the system’s security features are reliably implemented. For a classified C4ISR system architecture in active duty within NATO, it is expected to achieve a Common Criteria Evaluation Assurance Level (EAL) 5+, i.e. semi-formally (or formally) designed (verified) and tested.
The School of Informatics of AUTh participated in NRDC-GR Cyber Operations Seminar on Wednesday 16 December 2020, with two presentations:
1. Cyber-security Threats and Protection of C4ISR Systems by Prof. Panagiotis Katsaros (presentation attached)
2. Post Quantum Cryptography by Prof. Konstantinos Draziotis (presentation attached)
C4ISR stands for Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance, which refer to a range of integrated and interoperable systems and services for land-based, airborne and naval operations. C4ISR systems work in a multi-level security setting and they are expected to support the integration and interworking of a multitude of components, sensors, effectors, peripherals, on-board systems, in network-enabled operations environments.