Command, Control, Communication, and Intelligence (C3I) systems are increasingly used in critical civil and military domains for achieving information superiority, operational efficacy, and greater situational awareness. Unlike traditional systems facing widespread cyber-attacks, the sensitive nature of C3I tactical operations make their cybersecurity a critical concern. For instance, tampering or intercepting confidential information in military battlefields not only damages C3I operations, but also causes irreversible consequences such as loss of human lives and mission failures. Therefore, C3I systems have become a focal point for cyber adversaries. Moreover, technological advancements and modernization of C3I systems have significantly increased the potential risk of cyber-attacks on C3I systems. Consequently, cyber adversaries leverage highly sophisticated attack vectors to exploit security vulnerabilities in C3I systems. Despite the burgeoning significance of cybersecurity for C3I systems, the existing literature lacks a comprehensive review to systematize the body of knowledge on C3I systems' security. Therefore, in this paper, we have gathered, analyzed, and synthesized the state-of-the-art on the cybersecurity of C3I systems. In particular, this paper has identified security vulnerabilities, attack vectors, and countermeasures/defenses for C3I systems. Furthermore, our survey has enabled us to: (i) propose a taxonomy for security vulnerabilities, attack vectors and countermeasures; (ii) interrelate attack vectors with security vulnerabilities and countermeasures; and (iii) propose future research directions for advancing the state-of-the-art on the cybersecurity of C3I systems.
翻译:与面临广泛网络攻击的传统系统不同,C3I战术行动的敏感性质使C3I战术行动成为其网络安全的关键关切。例如,在军事战场上篡改或拦截机密信息不仅损害C3I行动,而且造成不可逆转的后果,如人命损失和任务失败。因此,C3I系统已成为网络对手的协调中心。此外,C3I系统技术进步和现代化大大增加了C3I系统受到网络攻击的潜在风险。因此,与面临广泛网络攻击的传统系统不同,C3I战术行动的敏感性质使得其网络安全成为人们关切的关键问题。例如,在军事战场上篡改或拦截机密信息不仅损害C3I行动,而且造成无法逆转的后果,如人命损失和任务失败。因此,C3I系统已成为网络对手的协调中心。此外,C3I系统的技术进展和现代化大大增加了C3I系统受到网络攻击的潜在风险。因此,网络敌人利用高尖端的攻击矢量攻击矢量来利用C3系统的安全弱点。尽管C3系统网络安全重要性越来越重要,但现有文献缺乏全面审查C3系统的安全性。我们提出了攻击性、攻击性研究系统和攻击性反措施。