Relevance of Information Warfare Models to Critical Infrastructure Protection

نویسندگان

  • Brett van Niekerk
  • Manoj S. Maharaj
چکیده

This article illustrates the relevance of information warfare models to critical infrastructure protection. Analogies of information warfare models to those of information security and information systems were used to deconstruct the models into their fundamental components and this will be discussed. The models were applied to critical infrastructures to illustrate the relevance to critical infrastructure protection. By considering the interdependencies of the critical infrastructure sectors, it will be shown how all critical infrastructures can be modelled as information infrastructures when considering information warfare attacks.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

03 Voas lo

Foretelling these attacks, the President’s Commission on Critical Infrastructure Protection (PCCIP) announced in October of 1997 that the increasing dependence of U.S. critical infrastructures on information and communications has made them vulnerable to information warfare attacks. The commission found that while the resources needed to conduct a physical attack against these infrastructures h...

متن کامل

Can Critical Information Infrastructure Protection be Achieved With Untested Software?

Citizens of modern societies need access to information infrastructures that are reliable, secure, non-interruptible, and fault-tolerant. In October of 1997, President Clinton’s Commission on Critical Infrastructure Protection (PCCIP) announced that the United States’s infrastructure, which is responsible for relaying information and communications, is vulnerable to information warfare attacks ...

متن کامل

Critical Infrastructure Protection: Evolution of Israeli Policy

Cyber Warfare holds a grave hazard of striking national infrastructure while circumventing traditional defense systems. This article examines the evolution of Critical Infrastructure Protection (CIP) policy in Israel and analyses its performance. Israel has developed a unique legal and regulatory model for critical infrastructure protection, which was implemented in late 2002. Recently, a compr...

متن کامل

Defensive Information Warfare with Non-localizable Command and Control

I loosely define "hard" information defenses as those assurance mechanisms that tend more to prevent (rather than recover from) the ill effects of security breaches and which tend to be more static in nature. Similarly, I loosely define "soft" defenses as assurances that tend to rely more on recovery from security breaches and offer a more dynamic/adaptive kind of information protection. Inform...

متن کامل

Defending Networks against Denial of Service Attacks

Denial of service attacks, viruses and worms are common tools for malicious adversarial behaviour in networks. Experience shows that over the last few years several of these techniques have probably been used by governments to impair the Internet communications of various entities, and we can expect that these and other information warfare tools will be used increasingly as part of hostile beha...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011