Securing the Long-Chain of Cyber-Physical Global Communication Infrastructure
Author(s)
Choucri, Nazli; Agarwal, Gaurav
DownloadAuthor's final manuscript. (1.361Mb)
Terms of use
Metadata
Show full item recordAbstract
Executive Order, May 2019 states:
November 5, 2019
“...foreign adversaries are increasingly creating and exploiting vulnerabilities in information and communications technology and services ... in order to commit malicious cyber-enabled actions, including economic and industrial espionage against the United States and its people.” [1]
This paper focuses on the challenges of securing the long chain of global communication infrastructure, presents some illustrative data, and puts forth a multi-method research design for analysis of long-chain systems of information and/or communications technology, infrastructure, services, ownership, providers, and networks -- within a state and outside its jurisdiction – all essential for unimpeded global operations. A proof of concept for data requirements to support end-to-end integrated research is provided, along with highlights of some initial empirical analysis, with China as a case in point.
Date issued
2019-11-05Publisher
© IEEE
Citation
Choucri, N., & Agarwal, G. (2019). Securing the long-chain of cyber-physical global communication infrastructure. Proceedings of the 2019 IEEE International Symposium on Technologies for Homeland Security (HST), 1–7.
Version: Author's final manuscript.
The following license files are associated with this item: