Russian military developed combat antivirus software

Read Time:48 Second

The Russian military tested special programs to protect the communication channels of ACS Akatsiya, Andromeda and ESU-TK. The developed anti-virus software tracks unauthorized access of malware, detects the place of intrusion and detects extraneous files. It also warns the operator about a cyber attack and offers several options for reconfiguring the network and ways to solve the problem, Izvestia reports.

ACS equipment consists of a server with its own software, protected laptops, encryption devices and communications. For the transmission of information mainly satellite channels and radio channels are used. Although modern ACSs are, as a rule, not physically connected to the Internet, an attacker can infiltrate them by breaking into information transmission channels.

ACSs are designed for command and control of troops during hostilities, peacekeeping, special, humanitarian operations, as well as in peacetime. The systems maintain a constant exchange of data between command posts, headquarters and troops. Intelligence systems are integrated with ACS, including drones and satellites.

About Post Author

Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence
Happy
Happy
0 %
Sad
Sad
0 %
Excited
Excited
0 %
Sleepy
Sleepy
0 %
Angry
Angry
0 %
Surprise
Surprise
0 %

Author

  • @Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence

Previous post Happenings in Iraq
Next post No pollution here -Recommendations from the Tehran Emergency Center
%d bloggers like this: