Figure 2: Embedded Software and Information Technology Systems Are Pervasive in Weapon Systems (Represented via Fictitious Weapon System for Classification Reasons)
This image is excerpted from a U.S. GAO report:
www.gao.gov/products/GAO-19-128
WEAPON SYSTEMS CYBERSECURITY: DOD Just Beginning to Grapple with Scale of Vulnerabilities
2,623
views
1
fave
0
comments
Uploaded on October 10, 2018
Figure 2: Embedded Software and Information Technology Systems Are Pervasive in Weapon Systems (Represented via Fictitious Weapon System for Classification Reasons)
This image is excerpted from a U.S. GAO report:
www.gao.gov/products/GAO-19-128
WEAPON SYSTEMS CYBERSECURITY: DOD Just Beginning to Grapple with Scale of Vulnerabilities
2,623
views
1
fave
0
comments
Uploaded on October 10, 2018