RFID as a Tool in Cyber Warfare
نویسنده
چکیده
Computer network operations (CNO) can have an effect technically over any systems using logical communications, not limited to nodes with Internet connectivity. We note in this article some more unconventional venues to attack information systems security with radio frequency identification (RFID) technologies, and develop a threat model for RFID in military use. Unprotected RFID tags offer a back door for adversaries even into closed systems, and without user interaction; on the other hand, rather simple RFID-solutions are placed to protect even very secure areas. The model includes two types of typical military applications for RFID: physical access control and logistics. The model discusses the process and framework for auditing existing systems and planning new establishments.
منابع مشابه
Cyber Wars: A Paradigm Shift from Means to Ends
The last couple of decades have seen a colossal change in terms of the influence that computers have on the battle field, to an extent that defence pundits claim it to be a dawn of a new era in warfare. The use of computers and information in defence has manifested into various force multipliers such as Information Operations, C4I2SR Systems, Network Centric Warfare, to the extent that commenta...
متن کاملCyber Warfare Simulation to Prepare to Control Cyber Space
ccurate simulation of cyber warfare can prepare decision-makers for its challenges. With cyber warfare, it is possible to control an adversaries’ information, target the portions of cyber space used for situational awareness and decision-making, lead the adversary to make desired decisions, and strike directly at the opposition’s mind. A cyber attack diminishes individual and group situational ...
متن کاملCyber War Games: Strategic Jostling Among Traditional Adversaries
Cyber warfare has been simmering for a long time and has gradually morphed into a key strategic weapon in international conflicts. Doctrines of several countries consider cyber warfare capability as essential to gain strategic superiority or as a counterbalance to military inferiority. Countries are attempting to reach consensus on confidence building measures in cyber space while racing with e...
متن کاملOn Cyber Warfare Command and Control Systems
As Defense agencies and services expand their reliance on computer networks, risk to information availability and integrity increases. It is no longer adequate to rely solely on the now traditional defense-in-depth strategy. We must recognize that we are engaged in a form of warfare, cyber warfare, and deploy our resources using the strategy and tactics of warfare. Most Defense organizations ha...
متن کاملDesigning Cyber Warfare Information Infrastructure Resilience
Due to many cyber attacks in the last years, governments are realizing how vulnerable they have become should there be a break out of a cyberwar. This urged them to establish a cyber warfare information infrastructure in a short time. However, this cyber warfare information infrastructure relies heavily on public infrastructures, like electricity and the Internet, which will be most likely targ...
متن کامل