Home|Journals|Articles by Year|Audio Abstracts
 

Original Article

JJCIT. 2021; 7(3): 253-267


INCREASING SECURITY IN MILITARY SELF-PROTECTED SOFTWARE

Carlos M Gonzalez.




Abstract

The objective of this article is to describe a process methodology to increase security inside secure military self-protected software. Self-protected software is vulnerable to threats, most depend on the software user. Therefore, detection by self-protected software of the current user is very important. The methodology includes three phases: Detection of User, Analysis of current state, and Reaction actions. The Detection phase is comprised of assessing geographic location, time at present location and determining user kind (friend or foe) Analysis phase consists of analysing if self-protected software should be at present location, predicting future locations, and assessing the location level of threat. Reaction phase includes determining immediate and delay actions if any, and perform actions accordingly. Legal concerns are explained, countermeasures and covert actions are proposed and described. An analytical model shows that self-protected software that includes user detection provides more protection than self-protected software without user detection.

Key words: User Detection, Secure Military Software, Secure Self-Protected Software, Covert Actions, International Law






Full-text options


Share this Article


Online Article Submission
• ejmanager.com




ejPort - eJManager.com
Refer & Earn
JournalList
About BiblioMed
License Information
Terms & Conditions
Privacy Policy
Contact Us

The articles in Bibliomed are open access articles licensed under Creative Commons Attribution 4.0 International License (CC BY), which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.