Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
News

Computer Attack Demonstration Held As Part Of Phoenix Challenge

Applied Signal Technology : 24 May, 2010  (Company News)
A live demonstration has been performed of computer network exploitation and computer network attack by Applied Signal Technology
Applied Signal Technology has recently presented a live demonstration of its cyber solutions at the Spring 2010 Phoenix Challenge Conference held at the National Air and Space Intelligence Centre (NASIC), Wright-Patterson Air Force Base, Dayton, Ohio. The conference theme was Influence through IO: The Interagency and Coalition Imperative.

AST featured its cyber technologies in a unique, end-to-end computer network exploitation/computer network attack (CNE/CNA) demonstration that provided insight into how military information operations can be used to influence perceptions and actions. More than 100 government and industry participants attended the demonstration.

Roger Anderson, Vice President of AST's Network Intelligence Division, commented, "This was an excellent example of using our CNE expertise to enable a hypothetical real-world influence operation. The demonstration accurately reflected the significant amount of effort required to perform targeted network analysis and preparation prior to executing the detailed influence mission. The scenario illustrated how to exploit the convergence of legacy supervisory control and data acquisition (SCADA) protocols with industrial networks using internet protocol (IP) technologies. We intend to continue working closely with our customers to help them identify opportunities for implementing their traditional core missions using cyberspace tools."

Bookmark and Share
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo