Replication Does Survive Information Warfare Attacks
نویسنده
چکیده
Recent literature on information warfare has suggested that general replication is not useful in dealing with storage jamming attacks. We show that special cases of replication are useful not only in detecting but also in recovering from storage jamming attacks.
منابع مشابه
The Orientation step of the OODA loop and Information Warfare
This paper develops a theoretical model of the internal processes of the Orientation step of Boyd's OODA loop model. The Orientation step is important from an Information Warfare perspective as it is where the decision-maker combines their existing knowledge with new information. Any new information is a potential target for manipulation by Information Warfare attacks. The operation of the two ...
متن کاملDesigning Cyber Warfare Information Infrastructure Resilience
Due to many cyber attacks in the last years, governments are realizing how vulnerable they have become should there be a break out of a cyberwar. This urged them to establish a cyber warfare information infrastructure in a short time. However, this cyber warfare information infrastructure relies heavily on public infrastructures, like electricity and the Internet, which will be most likely targ...
متن کاملB IRTH ORDER IN PROGENIES OF CHEM ICAL WARFARE-INTOXICATED IRANIAN PEOPLE
In the present work we studied the birth order in progenies of lranian survivors of Iraqi chemical attacks during a period from 1984 to 1989. Then we compared the results with the birth order of the control group. Despite a slight difference between the birth order in the two groups of progenies, this was not statistically significant. This does not mean, however, that there are no genetic ...
متن کاملResilient Image Fusion
The paper describes a distributed spectral-screening PCT algorithm for fusing hyper-spectral images in remote sensing applications. The algorithm provides intrusion tolerance from information warfare attacks using the notion of computational resiliency. This concept uses replication to achieve fault tolerance, but goes further to dynamically regenerate replication in response to an attack or fa...
متن کامل