Technology Overview Combat Cloud Deep Dive About the Project
Combat Cloud Deep Dive > Electromagnetic warfare (jamming & spoofing) and cyberattacks are challenging cloud applications.
Electromagnetic warfare (jamming & spoofing) and cyberattacks are challenging cloud applications.
Segment: Technological Counters

Electromagnetic warfare (jamming & spoofing) and cyberattacks are challenging cloud applications.

Description

Besides organizational and capacity challenges, cyberattacks and contested electromagnetic environments are influencing the roll-out of combat cloud as technological counters. It is therefore vital for communication networks to have high cybersecurity standards. A technological challenge is compromised digital hardware such as microchips or motherboards, which are imported from overseas manufacturers with the potential to cause big security breaches on the technology supply chains. As the military increasingly depends on U.S. technology firms, which are dependent on Taiwanese chip manufacturing, a close coordination and integration of U.S. and Taiwanese technology and defense sectors is a potential way forward. Alternatively, the military could produce its own digital hardware.

Relevant Signals 6
Information 29
Loading...