Cases Cross-domain use case: Naval frigate The integrity of information systems on board military vehicles and vessels is of crucial importance. Hostile actors must never be able to gain control over vehicle or vessel systems or steal strategic information. Cross-domain use case: Drone observation If data in a network should not fall into the wrong hands, connections with other networks must be sufficiently secured, certainly if the data in question is classified. Cross-domain use case: Critical infrastructure If the controls of an infrastructure object must not fall into the wrong hands, it is imperative that the connections between it and other networks are sufficiently secured. Cross-domain use case: Connected military simulations Strategic military information in a network should not fall into the wrong hands. This is why securing connections with other networks is crucial, even if those connections are with friendly nations.
Cross-domain use case: Naval frigate The integrity of information systems on board military vehicles and vessels is of crucial importance. Hostile actors must never be able to gain control over vehicle or vessel systems or steal strategic information.
Cross-domain use case: Drone observation If data in a network should not fall into the wrong hands, connections with other networks must be sufficiently secured, certainly if the data in question is classified.
Cross-domain use case: Critical infrastructure If the controls of an infrastructure object must not fall into the wrong hands, it is imperative that the connections between it and other networks are sufficiently secured.
Cross-domain use case: Connected military simulations Strategic military information in a network should not fall into the wrong hands. This is why securing connections with other networks is crucial, even if those connections are with friendly nations.