RFID as a Tool in Cyber Warfare

نویسنده

  • Mikko Kiviharju
چکیده

Computer network operations (CNO) can have an effect technically over any systems using logical communications, not limited to nodes with Internet connectivity. We note in this article some more unconventional venues to attack information systems security with radio frequency identification (RFID) technologies, and develop a threat model for RFID in military use. Unprotected RFID tags offer a back door for adversaries even into closed systems, and without user interaction; on the other hand, rather simple RFID-solutions are placed to protect even very secure areas. The model includes two types of typical military applications for RFID: physical access control and logistics. The model discusses the process and framework for auditing existing systems and planning new establishments.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cyber Wars: A Paradigm Shift from Means to Ends

The last couple of decades have seen a colossal change in terms of the influence that computers have on the battle field, to an extent that defence pundits claim it to be a dawn of a new era in warfare. The use of computers and information in defence has manifested into various force multipliers such as Information Operations, C4I2SR Systems, Network Centric Warfare, to the extent that commenta...

متن کامل

Cyber Warfare Simulation to Prepare to Control Cyber Space

ccurate simulation of cyber warfare can prepare decision-makers for its challenges. With cyber warfare, it is possible to control an adversaries’ information, target the portions of cyber space used for situational awareness and decision-making, lead the adversary to make desired decisions, and strike directly at the opposition’s mind. A cyber attack diminishes individual and group situational ...

متن کامل

Cyber War Games: Strategic Jostling Among Traditional Adversaries

Cyber warfare has been simmering for a long time and has gradually morphed into a key strategic weapon in international conflicts. Doctrines of several countries consider cyber warfare capability as essential to gain strategic superiority or as a counterbalance to military inferiority. Countries are attempting to reach consensus on confidence building measures in cyber space while racing with e...

متن کامل

On Cyber Warfare Command and Control Systems

As Defense agencies and services expand their reliance on computer networks, risk to information availability and integrity increases. It is no longer adequate to rely solely on the now traditional defense-in-depth strategy. We must recognize that we are engaged in a form of warfare, cyber warfare, and deploy our resources using the strategy and tactics of warfare. Most Defense organizations ha...

متن کامل

Designing Cyber Warfare Information Infrastructure Resilience

Due to many cyber attacks in the last years, governments are realizing how vulnerable they have become should there be a break out of a cyberwar. This urged them to establish a cyber warfare information infrastructure in a short time. However, this cyber warfare information infrastructure relies heavily on public infrastructures, like electricity and the Internet, which will be most likely targ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013