Rethinking Defensive Information Warfare
نویسنده
چکیده
Although the origins of information warfare lie in the defense of critical computer systems, defensive information warfare (DIW) per se has advanced little beyond an information assurance model. Information assurance is an integral part of any military organization’s operations, but it falls far short of meeting the needs for robust defense of critical command-and-control (C2) computer networks against a sophisticated adversary. By looking at the ways that militaries have responded to challenging defensive situations in the past, some insights can be made into the nature of IW and potential application of conventional operations. This paper examines defensive tactics and strategies—from the German defense in depth that emerged from World War I to the American Active Defense that developed in the Cold War—and proposes a new mindset for DIW that draws on these operational concepts from military history.
منابع مشابه
The Analysis of Compound Information Warfare Strategies
The practical defensive and offensive application of Information Warfare most frequently involves the use of complicated compound strategies, in which multichannel and multilayered attacks must be analysed. This paper presents a systematic approach to the analysis problem, which is exploitable for defensive and offensive purposes.
متن کاملPatent acquisition services: A market solution to a legal problem, or nuclear warfare?
We study the novel business models of patent acquisition services and assess their implications for intellectual property markets and patent litigation. Through qualitative case studies and descriptive analyses of patent and litigation data, we find that the most recent innovations in the area of defensive patent acquisition business models are indeed distinct from offensive models and from pra...
متن کاملStrategic intelligence and networked business
The chances of firms achieving, or being subjected to, strategic surprise have escalated with the growth of internetworking technologies and the opportunities these afford for various forms of information warfare (IW) and net terrorism. The more a business depends on sophisticated information systems, the greater its vulnerability to stealth attack. Defensive IW will soon become a necessary cos...
متن کاملA Combined Offensive/Defensive Network Model
Most literature on network modeling takes a functional perspective. That is, it models the network based on the needs the network must serve. As information assurance has risen as a functional need, the network models have added the need for a protective stance. In almost all instances, such a stance has been defined in terms of firewalls. As cyberspace becomes the next sphere of warfare, we mu...
متن کاملDefensive Information Warfare with Non-localizable Command and Control
I loosely define "hard" information defenses as those assurance mechanisms that tend more to prevent (rather than recover from) the ill effects of security breaches and which tend to be more static in nature. Similarly, I loosely define "soft" defenses as assurances that tend to rely more on recovery from security breaches and offer a more dynamic/adaptive kind of information protection. Inform...
متن کامل