Future CJADC2 architectures and systems will need a strong and robust approach to security. Enabling trusted computing and data integrity will be critical for every software or hardware component in these networks and their underlying sensor systems to encrypt, process, and disseminate information. In this session, Taymor Kamrany demystifies CJADC2, discusses security protocols, and the importance of secure processing, cross-domain solution, encryption, and anti-tamper technologies.
WHO WE ARE
- About Us: https://www.mrcy.com/company
- Our Capabilities: https://www.mrcy.com/capabilities
- Our Products: https://www.mrcy.com/products
FOLLOW US ON SOCIAL MEDIA
- LinkedIn: https://www.linkedin.com/company/mercury-systems
- Twitter: https://twitter.com/mrcy/