Kompa Hidayat Paling Latest Edit
August 29, 2022 | Author: Anonymous | Category: N/A
Short Description
Download Kompa Hidayat Paling Latest Edit...
Description
RESTRICTED INTEGRATION BETWEEN AUTOMATIC AUTOMA TIC MESSAGING SWITCHING SYSTEM (AMSS) AND COMMAND, CONTROL, COMMUNICATION AND INTELLIGENCE (C3 I) IN FUTURE FUTURE MAL AYSIAN ARMED FORCES FORCES INTRODUCTION
1.
In Malaysian Armed Forces (MAF), the system plays an important role in order
to support the operational of the organization. So that, the system have make the work easier then before. There is many system that have been developed by our Subject Matter Expert (SME) and being outsources from the outside for our organizational use. In aspect of security, the system must be secured in order to prevent the information is being leakage to the outsider especially from adversary.
In this paperwork, we are
more focused on secure system that is commonly used which is Automated Messaging Switching System (AMSS) and Command, Control, Communication and Intelligence (C3I). 2.
The idea of integration for both of the system is started from our Chief Defense
Forces (CDF), which he want the research is to be done to see whether it is good for the MAF and our government especially in term of integration, financial and security. From that our Assistant Chief Of Staff Defense Communication and Electronic Division also have been being task to do a research for the better communication for the next MAF generation. The idea of converging the network also being discuss in MAF ICT Council Meeting serial 1/2017 dated 15th Jan 16 decided that the network of the system have been integrate by using same IP VPN which can save the money without additional cost. Now the overall system is being converged by using NWC but there is some of the placement is still in standalone. The expansion of AMSS and C3I also have been determine and include in Malaysia 2015 until 2017 budget which is focused on the development and integration of the system1. Beside that, Information Technology Strategic Planning MinDef 2016 - 2020 also focused on the integration of the system in future MAF.2 1
https://www.treasury.gov.my/pdf/bajet/maklumat_bajet_kerajaan/2017/b60.pdf
2
Information Technology Strategic Planning 2016 – 2020.
1 RESTRICTED
RESTRICTED OBJECTIVES
3.
In order to fulfill the requirement for this topic of Commandant Research Paper,
several objectives have been outlined which are:
a.
To do a research about the overall of both system - AMSS and C3I.
b.
To know the implication if both of the system is integrate.
c.
To know the advantage and disadvantage of the integration and
countermeasure if the system is integrate.
SCOPES
4.
The scopes of this Commandant Research Paper are:
a.
The general overview of the system.
b.
The history and roles of AMSS and C3I in MAF.
c.
The characteristic between both of the system.
d.
Requirement for integration.
e.
Different between the system.
f.
Recommendation.
g.
Conclusion.
PROBLEM STATEMENT
5.
The problem statement of this paper is as followed:
a.
The integration is related between two different communication system.
b.
There is no AMSS system in naval ship that is now operate.
c.
Preparation cost and high maintenance.
d.
C3I operational system that is not fully utilize.
e.
Maybe both of the system can be integrate. 2 RESTRICTED
RESTRICTED THE HISTORY HISTORY AND ROLES ROL ES OF AMSS AND A ND C3 I I
6.
History of Automatic Message Switching System (AMSS). The history of AMSS
Cell is started ad-hoc in 1 Mei 1995. The establishment of the project team had been approved on 15 Jan 1996. It is start fully used in MAF on January 1999 (In minimum) replace the analog legacy system that is point to point teleprinter. In 15 Dis 2005 the cell have been transfer to KOMLEK. The organization of AMSS Cell is shown in Ap Appen pendi di x A. A. The roles and task of the cell is as followed:
7.
a.
Manage the operational of AMSS.
b.
Manage the maintenance of IP VPN AMSS.
c.
Manage the one - off project and planning for AMSS.
d.
Planning the development of AMSS.
e. f.
Ensure the security of AMSS which is crypto and smart card. Organize and monitor the course and seminar for AMSS.
The digital technology is now have been replace the analog system. Before that
the system is used by every COMCEN and now the system is already used by every unit. They are used DEMS PKI software to send a message followed procedure that is set by Allied Communication Publication (ACP 123). The message can be send based on priority and security classification. The enstablishment of AMSS is as followed:
a.
Phase 1 - Improve and increase the placement of AMSS with the total
of 185 placement in year 2004 - 2005. b.
Phase 2 and 3 - Improve and increase 302 placement in year 2009 -
2010. c.
Additional placement - In year 2011 - 2017 there is increase to 34
placement. d.
Total placement is consist of 521 placement placement with 900 terminal terminal
(Consist of
Supervisor Terminal (ST), Message Terminal (MT) and Crypto
Terminal (CT). 3 RESTRICTED
RESTRICTED 8.
91 RSR. The unit which support the operational of AMSS is 91 RSR. It is started
operate in year 1999 consist of 32 Officers and 972 other ranks. The organization is shown in Ap in Appen pendi di x B. B . The roles and task of 91 RSR are as followed:
a.
Provide sending news and parcel delivery services.
b.
Increase the level of news and packaging operations in tandem with the
development of up-to-date information technology. c.
Train members to be self-employed in the handling and maintenance of all
syst st em. em . The 1kW duplicate trunk communication systems, which is AMSS sy system and the Service Delivery Service are more professional. d.
Improve the quality of leadership, management, personal and spiritual
values to form disciplined, honest, loyal and responsible military personnel in all circumstances.
9.
History of Command, Control, Communication and Intelligent (C3I). The C3I ATM
system was first developed by GEC Marconi Company in 1990 and handed over to the ATM in 1996. In the beginning beginning of 1997, the improvement improvement initiative initiative was taken with the appointment of System Consultancy Services (SCS) Sdn Bhd to implement maintenance on the system. Due to the rapid increase in technological factors and the increasing need, the C3I MAF system requires changes and improvements. This involves changes to organizations and functions, dubious system security issues, hardware and software interrupts caused by Y2K and software structures that have limitations to changes. Therefore, the action taken by taking a cost effective approach for the long term is by developing the software in total and replacing the existing hardware. The PX2000 software was later developed by the cooperation of SCS Sdn Bhd and the ATM before the system evolved into the NC2 System as it applies today. Connection contract extension was implemented in 2001 until now.
10.
C4ISR Cell and RPS. The organization organization of C4ISR C4ISR Cell Cell (KOMLEK) is shown in
Appen Ap pendi di x C. C. The RPS which is a unit that support C3I operation is operated in 1997
4 RESTRICTED
RESTRICTED with the strength 88 officers and 850 other ranks. The organization is shown in Appen Ap pendi di x D. D . The roles of RPS are as followed:
a.
Provides C3I System services to all C3I ATM Users.
b.
Provides the highest network of ATM Governance Communications and
Co-Communications. c.
Provides Mobile Strategic Extension to C3I Systems.
d.
Providing Trunking Radio communication and Satellite Satellit e Communication for
MAFHQ and Joint Forces HQ. e.
Provide training in the management, operation and maintenance of C3I
Systems. f.
Provide team administration and logistic requirements.
BASIC BA SIC CONCEPT CONCEPT AND A ND UNDERSTANDING UNDERSTANDING THE SYSTEM IN MAF OVERVIEW
11.
AMSS. AMSS also known as Automatic Messaging Services System is a system
that provide the communication for messaging using Allied Communication Publication procedure (ACP 123). The message that is sent are based on security classification and priority of the message. This system have two encryption way which is encryption using message encryption and secure network. The system also include with security which have biometric device and smart card for multi authentication.
5 RESTRICTED
RESTRICTED
Figure 1 – AMSS AMSS Interface Interface 12.
C3I. C3I also known as Command, Control, Communication Communicati on and Intelligence is a
system which provide the secret information to the commander in order to do a decision. It also provide command and control among the commander and COPS through the network. This system is now used in a formation in order to provide command, control and act as decision maker from an appointment military commander. It is developed by using Local Area Network (LAN) concept and Wide Area Network (WAN). This system is integrate with all three services including Joint Services. Now there is about 103 C3I placement placement in Malaysia. This system also provide Strategic Communication Network, ADP, Communication System and Video Conference. 13.
This system using distributed database database and update by the local user from time to
time. Although the system is integrate with all services but the database is used by own services. The system can support for Joined Forces, Military Operation Other Than War (MOOTW), Human Assistant Disaster Relief (HADR) and public operation. This system is also design to allow the user to get the data based on user access control (user role). RPS is responsible to maintain and technical advisor to all C3I placement. If the system is failure, user can submit the report through Help Desk Online System that’s operate for 24 hours. 6 RESTRICTED
RESTRICTED 14.
The integration of the database is happen for MAF which which is located at Defense
Operating Room (DOR). Joint C3I can get the data from 3 database by services and own database. The use of this system is able to provide and disseminate accurate information thoroughly using a secure system. It also helps the government to give direction and control in war, threats, riots and natural disasters based on existing information. Since the C3I system is capable of supporting current and future operating needs, the system's capabilities need to be enhanced to meet the need to support the Network Centric Operation (NCO) system during 2015 - 2020.
Figure Figur e 2 - C3I Interface
NETWORK
15.
The network diagram of the system is different each other depend on the need
for basis. The AMSS diagram is can be refer in Figure 3. 3. The diagram below also show the conceptual and the link towards each node. The way it connect each other are directly using secured IP VPN. 7 RESTRICTED
RESTRICTED
Figure 3 3 - AMSS Diagram
16.
The C3I diagram before it is converged with AMSS system are as followed:
Figure 4 4 - C3I Network
17.
From the diagram, we we can summarize that the flow of the network started from IP
VPN, CE router, IP Encryption (Only allow the registered IP to go through the network), riverbed (Act as Quality of Services (QOS)) and distribute from the switch to the application. 8 RESTRICTED
RESTRICTED 18.
The C3I diagram after it is converged is as followed:
Figure 5 5 - C3I with NWC
NODE AND LOCATION
19.
AMSS. Node and location of the system system is is different but some of the line is
converged together and standalone. The AMSS have 8 nodes and consist of about 521 location. There is about 901 terminal and 75 supervisor terminal are being issued for the system. The terminal for sending message the terminal UU consist of about 685 and for Terminal HH is 141 terminal. a.
Network Control Centre (NCC) is consist of two which is:
(1)
Main Node - KUL.
(2)
Regional Node – Node – BTW, BTW, LUM, KLB, KTN, TDK, KKU and KCH.
9 RESTRICTED
RESTRICTED b.
The main node and regional node is as followed:
SER
NODE
LOCATION/PLACEMENT LOCA TION/PLACEMENT
1.
KUL
KUL 1 - KUL 5.
2.
BTW
BTW 1 - BTW 5.
3.
LUM
LUM 1 - LUM 6.
4.
KLB
KLB 1 - KLB 3.
5.
KTN
KTN 1 - KTN 6.
6.
TDK
TDK 1 - TDK 6.
7.
KKU
KKU 1 - KKU 2.
8.
KCH
KCH 1 - KCH 2.
Table 1 1 – The – The Location/Placement of The Node (AMSS)
Figure 6 6 – AMSS – AMSS Location of Node 10 RESTRICTED
RESTRICTED 20.
The detail location can be summarize as table below:
SER
SPEED
TOTAL LOCATION LOCA TION
NWC 1. 2. 3. 4. 5. 6. 7. 8.
1. 2. 3. 4. 5.
40 Mbps 30 Mbps 20 Mbps 16 Mbps 12 Mbps 10 Mbps 6 Mbps 4 Mbps TOTAL STANDALONE 4 Mbps 2 Mbps 1 Mbps 512 kbps TOTAL
Total detail of location is not shown because of confidentiality
45
Total detail of location is not shown because of confidentiality
256 Kbps
156 Table 2 – 2 – AMSS AMSS Location
21.
C3I. The C3I system have about 103 location consist of 69 static location and 34
mobile location. The terminal that have being issued is about 1160 terminal.
Figure 7 7 – C3I – C3I Location/Placement 11 RESTRICTED
RESTRICTED CRYPTO SYSTEM
22.
The crypto system also have different for each of the system. The crypto is act as
to secure data in appropriate way to unable the adversary or outsider to read the message. The different are as followed:
Method Me thod
Equipment Company Sites
AMSS C3I encryption - Will allow Message Message encryption - The message Network encryption registered IP to enter the is encrypted. Using secure network which is IP network using crypto. Using secure network which is IP VPN. VPN. Different model and requirement Different company Different sites Table 3 3 - Crypto System
ACCESS LEVEL
23.
Access level is the level of capability and the system which is located. It can be
conclude that the AMSS and C3I facilities are different for each level. It is also based on each services. The access level are as followed:
Arm Ar my
Navy Airr f or Ai orce ce
AMSS ➢ Every level until unit in field
C3I ➢ DOR
➢
➢ Army
DOR, MK Formation, Div Inf, Bde Inf and unit ➢ Placement of static and mobile (Planning to buy for this year) ➢ DOR until ship (Basement) (Basement) ➢ DOR
until squadron
Field Command West, Army Field Command East, ➢ Div Inf Fmn and Bde Formation ➢ Placement of static and mobile ➢ DOR until ship (Basement and operation) ➢ C4 I Tacx (Medium X-Band) ➢ DOR until squadron squadron
Table 4 4 – Access – Access Level
12 RESTRICTED
RESTRICTED STRATEGIC PARTNER
24.
The strategic partner is a part of the development of the system. It is backbone to
the whole system. The two strategic partner for each system is as followed:
SER AMSS 1. Telekom Malaysia Malaysia – – Main contractor provide line and maintenance (NWC). 2. Wadah Sejati Sejati – – Aircond, power supply and electric work.
4.
Siaga Lab Lab – – software for operating system. Mesin Niaga Niaga – Hardware – Hardware that is related to
5.
the system. Wira Muhibbah Muhibbah – Paper – Paper and toner.
3.
C3I Telekom Malaysia Malaysia – – Provide line and maintenance (NWC). System Consultancy Services Services – – Provide and maintenance all requirement for operating the P4 system. (System, Generator, network utilities).
Table 5 5 - Strategic Partner COST
25.
AMSS. The cost of the operational for 1997 until 2020 is over RM 60 million. The
spending of renting of NWC have save over RM 1,200,000 per year. Line capacity of AMSS stand-alone stand-alone that p provide rovide by Telekom Malaysia Malaysia (TM) are are as followed: followed:
SER 1. 2. 3. 4. 5.
BANDWIDTH BA NDWIDTH 4 Mbps 2 Mbps 1 Mbps 512 Kbps 256 Kbps TOTAL
TOTAL LOCATION
TOTAL LOCATION L OCATION AND RENT RATE (RM)
Total rent in detail is not shown because of confidentiality
156
8,000,000 ++
Table 6 6 – Line – Line capacity of AMSS standalone 13 RESTRICTED
REMARK
RESTRICTED
26. C3I. The history of procurement is as followed. Fixed line capacity that is provide by Telekom Malaysia for the C3I are as followed:
SER 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11.
BANDWIDTH 40 Mbps 30 Mbps 20 Mbps 16 Mbps 10 Mbps 8 Mbps 6 Mbps 4 Mbps 1 Mbps 512 Mbps 256 Mbps TOTAL
TOTAL RENT IN A YEAR (RM) 1 MONTH 1 YEAR
REMARK
Total detail rent is not shown because of confidentiality
200,000++
2,000,00 2,000,000 0 ++
Table 7 7 – Fixed – Fixed Line Capacity TECHNOLOGY TECHN OLOGY AND SOFTWARE
27.
AMSS. The evolution evolution of AMSS is as followed:
a.
Before 1997 which is using point to point teleprinter - analog.
b. c.
1997/1998 - Sending message by using computer through TM fixed line. 2000 - 2005 - The system is improvised from analog line to digital and
400 based messaging. d.
2006 - 2008 (DEMS Phase 1) - AMSS System improvised more by using
ACP 123 and Directory Services. Services. e.
2008 - 2011 (DEMS Phase 2 and 3) - Migration network to IP VPN with
increases of bandwidth. f.
2015 - Implementation appendices file system (Attachment (Attachm ent file).
14 RESTRICTED
RESTRICTED 28.
C3I. The C3I software evolution is as followed:
ST
RD
ND
TH
1 GENERATION GENERATION
2 GENERATION GENERATION
3 GENERATION GENERATION
4 GENERATION GENERATION
System System Command and Control Software
GEC Marconi OEM version.
Platform
Unix
Redeveloped Software. Further - current Ops requirement Windows
User Interface
TOTE, textbased, limited map Without Exercise, JIC, JTF User Access
With multimedia, GIS
With integration to tactical units (ships), GIS, SFS. Windows, Open Source, Java, C++ With multimedia, video, GIS
With integration to tactical units (ships), GIS, SFS. Windows, Open Source, Java, C++ With multimedia, video, GIS
With 3 exercise environment, JIC, MAB 50 Security Dalil,
Enhanced MAB, Tactical ShipShore, UAV feed VPN, IDS, File
NC2, Tac-X, UAV Feed
Control only
7 layer embedded security
Change Detect, SANs compliance
Map OA
`Tellus Uniplex
MapInfo Microsoft Office
MapInfo Microsoft Office
E-Mail
Uniplex
OS
HP-UX
Microsoft Exchange Windows NT
Database
Ingress Ingres s
MS SQL
Microsoft Exchange Windows 2000/XP MS SQL
Appl Ap pl ic ati on
Client- Server
Client - Server
Hybrid
Database Portal Development
Centralised No Portal Ingress - 4GL
Distributed HTML VB
Centralized HTML VB/ASP/C++ VB/ASP/C++
Login Admi Ad mi n Tool To ol s Database
No Standard HP-UX Utilities 1 Database – Database – Ops
Military number PXM 3 Databases – Databases – Ops/Trg1/Trg2
Military number PXM 3 Databases – Databases – Ops/Trg1/Trg2
Server and Workstation
Server and Workstation
Server and Workstation
Ap pl ic ati on Appl modules Security
Deployment
Table 8 8 – The – The C3I Software Revolution
15 RESTRICTED
VPN (Ciku), IDS, File Change Detect, SANs compliance ESRI Microsoft Office (OWA) Zimbra Windows 7 MS SQL / ESRI Geodatabase Web-Based Centralized Sharepoint Silverlight/C++/T elerik Appointment AdminUtil 1 Database – Database – Ops/Trg1/Trg2 Server
RESTRICTED SERVICE PROVIDER
29.
AMSS. AMSS system is using Local Area Network (LAN) and Wide Area
Network (WAN) allow the user to send and receive message using ACP 123 standard. It can send the message to the specific address and now using commonly in administration of the unit. For message that is classified as secret, the message will be sending using crypto. There is also certain procedure in order to send corrected message, cancellation of message, request message that is receiving, readdress and related procedure to ensure the message can be corrected, readdress and receive to the user.
30.
C3I. The C3I system is using Local Area Network (LAN) and Wide Area Network
(WAN). It is distribute information using secure system. It is to support the commander in order to do a decision guided by Common Operating Picture (COP). In the C3I system, there is many functionalities such as e-mail, Geographic Information System Mapping (GIS), Asset Management, Microsoft Sharepoint, Chatting, Document Management and report in order to support the operational, administration and logistic support. It will provide the data from the responsible unit to the appointment military commander in order to do a good planning and decision. 31.
The service provider by both of a system can be summarize as followed:
Service Provider
Less used by user
AMSS Sending mail and military letter as an online. File attachment. - Text - doc, xls, ppt and pdf). - Graphic - jpeg and bitmap. - Text and graphic send/receive 40 MB maximum MB maximum
C3I
Data Situation awareness, Common Operation Picture System (COPS), Map, Document Sharing, E-mail and Image. Telephone/Fax IP Telephone, Analog Telephone, Faxmile and Hotlines. Video Conference Video, image and audio (Limited Comms Strategic Extension (Fixed Sites Bandwidth). and Transportable) Table 9 - Service provider 16 RESTRICTED
RESTRICTED FINDING AND DISCUSSION
WEAKNESS
32.
The weakness both of the system can be summarized as follow:
AMSS
C3I
There is an equipment that is still used more then 10 years (Ageing). The equipment is ageing due to contract that is aggreed by both of the govt and company. There is no backup line/system. The line that is used by the system by using one line and
There is an equipment that is used more then 10 years (Ageing). The equipment is ageing due to contract that is aggreed by both of the govt and company. There is no backup line. The line that is used by the system is using one line and there is a
there is no backup system once the system or server have a problem. Many unit that is include. The AMSS can be used for many of the unit.
Disaster Recovery Centre (DRC) that is stated and act for the system. Access until Bde Bde Formation onl only. y. The system is now more focus on Bde formation only. It is usually used by Bde staff in order to provide information and command and control for the commander.
No backup for storage. The AMSS system is also no included backup storage once the system is down. Contract less comprehensive. The contract is sub to many of the company and not comprehensive. Less bandwidth (Stand - alone). The system is used by the application doesn’ doesn’t need a lot of data. Table 10 10 – Weakness – Weakness Of The System S ystem
17 RESTRICTED
RESTRICTED DIFFERENT BETWEEN THE SYSTEM
33.
The different between system is as followed:
SUBJECT SUBJ ECT
AMSS
C3I
Focus
Daily GAQ. The system is used for administration for daily used. It focus on message to be sent to unit and required action or info to the unit.
Operational. The system used for command and control. It will stored the data of every unit in a server to convert into smart data for the commander to do a decision. User Use by other rank (Clerk). Those who Use usually by an officer. Need to have attend the course at 91 RSR for 1 attend the course at RPS. until 2 weeks. The course is related about procedure related for AMSS. Bandwidth Does not need large bandwidth. It send Need large bandwidth. It also only a message and image. consist of sending message, image, audio, situational awareness and video conference. Tonner and Tonner and paper provide by supplier. Tonner is provide by supplier. Many of the model use is Hewlett Many of the model used is Brother paper brand. Packard (HP) brand. Asset As set The terminal is for static place only. The The terminal is for static and mobile terminal will be used in the mobile. future. Crypto / System crypto and software is different System crypto and software is Software Using message encryption and IP VPN. different. Using IP crypto and IP AMSS using software software DEMS (PKI). (PKI). VPN. C3I using PX 2000 and using a browser as a platform. Management Manage in regional. Manage by officer in each of the system placement. Table 11 11 – Different – Different between the system
18 RESTRICTED
RESTRICTED CONSTRAINTS
34.
The constraint for integration is as followed:
a.
There is 156x AMSS placement and 3x C3I line that is still standalone.
b.
Many of AMSS line have maximum speed 512 and 256 Kbps.
c.
The software of both system is different.
d.
Will increase the initial cost for convergence system and rate of rent will
be increase. e.
Use 2 different equipment and crypto software.
REQUIREMENT FOR INTEGRATION
35.
The integration of the system is become crucial to the highest commander. It is
also to ensure all the system is parallel and to ensure all the system integrate each other. It can provide command and control to the organization. Now both system have to integrate the line by using IP VPN. However certain location is integrate and certain places is still standalone because some of the place does not have C3I.
36.
In NCO there is an integration between all system. By using C3I as a backbone
and the other system to support the operation, It can provide all data in order to give to the higher commander to do a decision. The system is still in different use because of roles and task of the system is different each other.
37.
By using X-Band, it can be an alternatives and platform to communicate between
each other. The presence of X-Band will help to communicate using satellite as a platform. Although it is a strategic asset now it have been used until tactical level. It can be shown when the procurement of the X-Band have been issued to the unit until tactical level.
19 RESTRICTED
RESTRICTED
Figure 8 8 – Network – Network Connectivity Architecture for NCO
Figure 9 9 – Current – Current Networking NC2 Deployment State 20 RESTRICTED
RESTRICTED
Figure 10 10 – MAF – MAF Network
IMPLICATIONS – ADVANTAGES AND DISADVANTAGES 38.
The advantages and disadvantages of integration is as followed:
ADVANTA GES ADVANTAGES DISADVANTAGES Make the maintenance procedure is easier Make the one company monopoly to the which is one company. The maintenance can contract. be easier because the maintenance will be centralize. Using the same software and crypto system.
There is no warranty if the system being hack or down in security aspect. Using one terminal for operation of both There is no backup for the system if there is a system. problem in a formation/unit. Larger bandwidth for all site. Line rent cost will be increases. The system operational will be problem especially in a unit – – Combine both of the system. Procurement cost / new software and hardware will become higher. Table 12 12 - Implication - Advantages and Disadvantages 21 RESTRICTED
RESTRICTED SECURITY
39.
The security is a crucial part which is compulsory in every system. In AMSS and
C3I there is certain element of the security between them that should be considered. The security element of the system must followed the principle below:
a.
Confidentiality. Confidential ity. Information and communication systems only can be
handle and reached by authorized persons only. It can be show that the
system have their own security for example biometric device, card and password. We can combine it together to get the system more secure. b.
Integrity. Information and systems should always be accurate and correct.
c.
Availability. Information, systems and hardware always accessible to
eligible users when required. d.
Non-Repudiation. Non-Repudiati on. Transaction of every information in a system is
recorded. Dispatches and receivers information in a system cannot deny the transaction process that happens. 3
AMSS Auth Au th entic ent ic ati on Multi authentication - Using biometric card and password. Crypto (Both Encrypt message. The system are mention in encrypt the message that is sent to subtopic the user. crypto) Purpose Administration Administrati on only. It is send daily to send the message or info for daily purposed used.
C3I Authentication Authentica tion - Using own username and password. Encrypt Network. It will encrypt the network and allow only registered IP to enter the system. Operational (GAQ). It is used for operational to ensure the command and control in a formation.
Table 13 – Security of the system 3
MD 3.2.2A TD Manual Keselamatan Komunikasi dan Elektronik
22 RESTRICTED
RESTRICTED RECOMMENDATIONS
40.
The both system is already established from 1990 and above. Then, what we
have must be improvise from time to time due to the technology changes and industry revolution 4.0, so that we can have the better system for our future use. From my analysis, the system can be integrate as we considered the subject is as followed:
a.
Strength of the Unit and Different Roles and Task. Based on my research
the unit itself have different roles and task. Both system are act as strategic and operational communication which AMSS is only for admin and daily messaging while C3I is for operational that includes all requirement and needed for the commander. For future, we can consider a few thing is as followed:
(1)
Maintain what we have now and just more focus on technical and
development part which one system can be used both of the unit which is 91 RSR and RPS. (2)
The one of the responsible for the AMSS Cell can be detached
from 91 RSR to RPS but certain thing must be consider and the paperwork should be done and must be coordinate properly. (3)
Management of the system can be centralize or execute by a team
member.
b.
Increase Placement of Standalone to Convergence Network. In aspect of
the network the system is already be converged by both of the network. The convergence also have save a budget without additional cost required. There is 45 placement that have been converged the network. However, there is 156 placement of AMSS that is not converged the network with the C3I. In future we can do a research and focus more to the AMSS standalone for integration. c.
Enhance the Security of The System. In aspect of security we can do a
comparison for both of the system which they have their own crypto and different in security aspect. We can be suggest the both system used the same crypto and 23 RESTRICTED
RESTRICTED do some improvise by using both of the crypto which one is the best. To authenticate we can used and increase the aspect of security system used by both of the system such as card and biometric authentication. d.
Technology and Software Development. The technology and software
have been unchanged and ageing. In order to suit with the latest technology we suggested that the system can be integrate but must be design it very well and user friendly. In the next contract we can suggest the research can be include in the contract so that the development of the system and module can be improvise very well. To save the cost of budget, we also can suggest that to create a team member to develop the software. The team member should be Subject Matter Expert (SME) and go to the course that are related such as software engineering and focus to the development of the system. e.
Improvise the Wi-fi Wi-f i Infrastructure Network For Every Placement. Placement . The
system is already allocate to every formation and unit. In a worldwide of digital and internet of things we also must consider the used of wi-fi internet and internet for workstation. The used of the internet can improve daily work and make all the information is can be access worldwide. We can suggest that wi-fi infrastructure can be include for the next contract. For the first time, it required a high cost but in future when we have an infrastructure we just have to maintain it and allocate for maintenance. f.
Allocate the AMSS at Royal Malaysian Navy (RMN) Ship and C3I
placement until Unit Level. Based on the research both of the system is allocate at certain placement for used and focus on the usage and roles and task. What we can suggest is the used of AMSS is suggested to be link to the RMN ship that is now operating. It is to ensure the information and admin part can be easily be send. In C3I we can upgrade the allocation until the unit so that the commander in Bde and Div level can command and control the unit under command itself.
24 RESTRICTED
RESTRICTED CONCLUSION
41.
Based on the research, we can conclude that in MAF the system is now are
converged the line without converged the system. We can recommended that in the future the system can be integrate each other but it will affect to an organization, role and task, cost and related as stated in this paper. If the system is integrate, the things that should be considered is the cost and the usage of the system. We must consider the utilization of the system to prevent us from wasteful. This paper also tell us about the both system in term of capability, what we do now and planning in the future MAF. (5217 words) Sep 2019
MOHAMAD NUR HIDAYAT HIDAYAT BIN ZARKIA @ ZAKARIA Kapten Signal Regiment Officer Communication Course Serial SROCC 28/2019
25 RESTRICTED
RESTRICTED BIBLIOGRAPHY Dasar Keselamatan ICT 5.0 dated 1 Jan 17. Information Technology Strategic Planning 2016 – 2016 – 2020. 2020. MP 3.3.1 A TD Prosedur PUSKOM, Penulisan Berita dan KHS (Sementara) (Sementara) 2010. MD 3.2.2A TD T D Manual Keselamatan Komunikasi dan Elektronik. MD 6.0A TD Semboyan. Semboyan. https://www.treasury.gov.my/pdf/bajet/maklumat_bajet_kerajaan/2017/b60.pdf
26 RESTRICTED
View more...
Comments