Tactical Analysis of Attack in Physical and Digital Security Incidents: Towards a Model of Asymmetry
نویسنده
چکیده
Asymmetric warfare is frequently described as a conflict where ‘weaker’ parties aim to offset their relatively inadequate resources by using particular strategies and tactics to their advantage. This research-in-progress paper develops a concept model of asymmetric warfare that represents the leverage available to the ‘weaker’ party over the ‘stronger’ party simply because the former is attacking rather than defending. Points of leverage include choice of timing, location, method of attack, best use of limited resources and time to prepare. The resulting concept model is used to discuss generic defensive strategies that can be applied by ‘stronger’ parties in the physical and digital environments. For example, defenders can make their assets difficult to access except under limited circumstances such as a carefully designed defensive system. In this way attackers are forced to engage targets under conditions that maximize the defenders own advantages.
منابع مشابه
Social Threats Modelling with i*
Security incidents lead to loss or disruptions of an organisation’s operations, services or functions, or reductions in the quality of the expected services. For any security incident, there is an individual or a group of attackers, conducting the attack action, towards one or many victims. The two sides are played by social actors, with certain social positions, protecting or obstructing a giv...
متن کاملAnalysis and Improving the Security of the Scalar Costa Scheme against Known Message Attack
Unintentional attacks on watermarking schemes lead to degrade the watermarking channel, while intentional attacks try to access the watermarking channel. Therefore, watermarking schemes should be robust and secure against unintentional and intentional attacks respectively. Usual security attack on watermarking schemes is the Known Message Attack (KMA). Most popular watermarking scheme with stru...
متن کاملAn Effective Attack-Resilient Kalman Filter-Based Approach for Dynamic State Estimation of Synchronous Machine
Kalman filtering has been widely considered for dynamic state estimation in smart grids. Despite its unique merits, the Kalman Filter (KF)-based dynamic state estimation can be undesirably influenced by cyber adversarial attacks that can potentially be launched against the communication links in the Cyber-Physical System (CPS). To enhance the security of KF-based state estimation, in this paper...
متن کاملEnhanced Flush+Reload Attack on AES
In cloud computing, multiple users can share the same physical machine that can potentially leak secret information, in particular when the memory de-duplication is enabled. Flush+Reload attack is a cache-based attack that makes use of resource sharing. T-table implementation of AES is commonly used in the crypto libraries like OpenSSL. Several Flush+Reload attacks on T-table implementat...
متن کاملAnalysis of the Impact of Economic Growth and Asymmetric Information of Capital Market of Iran on Investors\' Confidence: A Multivariate GARCH approach
The stock exchange, as part of the capital market, in case of necessary conditions, can equip national capital and direct it towards economic growth. A secure environment for investment and information asymmetry are considered to be the features of a good business, in which managers are working towards stockholders. This research seeks to investigate whether information asymmetry of financial m...
متن کامل