Advanced C5ISR Security of AGIS LifeRing

0
137


Most Secure C5ISR

AGIS LifeRing Security

AGIS Processing Commercial Satellite ELINT from South China Sea

Multiple Layers of Cyber, Data, and Authentication Security for Military Operations

All knowledge that’s transmitted is first protected utilizing AGIS proprietary message alternate codecs, that are recognized to AGIS and just one U.S. entity.”

— Malcolm Ok. Beyer, Jr.

JUPITER, FL, US, September 30, 2022 /EINPresswire.com/ — AGIS – Advanced Ground Information Systems, the makers of LifeRing Multi Domain Data Link (MDDL) Software, have designed a C5ISR Common Operating Picture (COP) to be essentially the most complete and simple to make use of Command and Control system on this planet. With the newest model Release 6.03, it’s now essentially the most safe.

From the on-boarding of C5ISR customers, to organizing customers into teams, to encrypting the information and communications exchanged by all these customers, safety has been built-in at each stage.

All on-boarding customers should initially be authorised by their approving authority as a way to have a licensed copy of the software program and have a registered account on the AGIS Server. Both the software program set up and the server entry info need to be issued to every consumer by an Administrator or gatekeeper to the system.

Using a simplified however safe course of, all consumer accounts might be set as e-mail validation or via the handbook approval/enabling of the account by the Administrator.

Once a consumer is granted login entry, they then want to hitch or create a bunch as a way to use the system and to have the ability to add any knowledge to the map-oriented consumer interface. The originator of a bunch can set up a Group Name, as much as 20 characters, and a password as much as 50 characters, to create a bunch. No consumer can be a part of an present group until they know the exact group identify and the password. Many teams might be registered on the server and the system will assist as many as 30 distinctive group names on every PC, Tablet, or handheld gadget. Only when customers are in the identical group or teams can they alternate knowledge and site with one another.

See also  Zscaler Study Finds 90% of Global Enterprises are Adopting

Group Security Access safeguards could also be put in to

a. restrict knowledge to the higher ranges of a command construction

b. restrict knowledge to solely a choose personnel, e.g., Intelligence

c. restrict the safety stage of knowledge shared throughout allied militaries

The formation of teams could also be primarily based on echelon, command construction, mission, safety stage or location. Groups might be set on the consumer’s native stage or on the subsequent command stage. New or extra teams might be arrange at every stage of a given organizational construction, with safety entry safeguards put in to securely seal off higher ranges of the command construction.

Depending on permissions and authorities, a consumer inside every Group can choose what Group they be a part of, and this can decide the information they are going to be licensed to obtain.

Built into the system is an non-obligatory setting for stealth operation. When this setting is chosen, a consumer’s location will now not be seen to different group members. All operational knowledge added or modified on the map by different customers, messages, chat, and PTT communications will stay seen on the map show. The consumer gadget in Stealth Mode nevertheless won’t transmit location knowledge.

Additional safety:

In the occasion a consumer is compromised or if the gadget is misplaced or stolen, the gadget in query could also be faraway from the community in two other ways.

At the server stage, a consumer might be quickly blocked from the community thereby forcing them to login once more.

A consumer will also be completely blocked from the community. This motion disables the consumer’s account from having the ability to login. Access privileges can solely be re-enabled on the server stage with the motion of the Administrator.

See also  HEISHA infinite power supply solution to embrace the robot era

All knowledge that’s transmitted is first protected utilizing AGIS proprietary message alternate codecs, that are recognized to AGIS and just one U.S. entity. The knowledge is then encrypted previous to transmission utilizing AES 256-bit encryption.

In areas the place communications are executed utilizing Harris or different U.S. army radios, the information is additional encrypted by the radio itself previous to transmission utilizing U.S. Type-1 encryption. When utilizing Motorola radios, the information is additional encrypted utilizing AES 256-bit encryption, however with a special encryption key.

At the server stage, AGIS knowledge transmissions have been built-in with XQ Messaging to fulfill Zero Trust NIST 800-171 superior encryption, routing, and knowledge administration compliance necessities. Whenever required LifeRing will use XQ Messaging’s Zero Trust, whereby the information being transmitted is encrypted utilizing separate keys for both the second or third time.

If a safe State of the Art Low Cost C5ISR system is of curiosity, please contact beyerm@agisinc.com

Malcolm Ok. Beyer, Jr.
Advanced Ground Information Systems (AGIS)
beyerm@agisinc.com

Most safe C5ISR system





Source link

LEAVE A REPLY

Please enter your comment!
Please enter your name here