Opportunity or Threat to Security ?

نویسنده

  • José Achache
چکیده

Between February 20 and 27, 2003, under the code name ‘Schriever II’, friendly ‘blue’ forces faced ‘red’ enemy forces during 8 days of a fierce battle in outer space. More than 300 military and civilian experts from more than 30 US agencies participated in this space war that took place 14 years in the future. Schriever II was only a war game, set in the year 2017! It took place at Schriever Air Force base, Colorado, under the supervision of General Lance Lord, commander of Air Force Space Command and was intended to explore 'critical space issues and the integration of space into the joint fight’. The objectives of the war game focused on examining space capabilities and laws, policies and strategies, not only those available now, but also those anticipated. The insights gathered from the war game will be used to design future acquisition policies. The concept was similar to Schriever 2001, the first war game to test space systems' vulnerabilities.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Political Communication and Financial Performance in Banks: Opportunity or Threat

 Political relationships can have both a positive and a negative impact on bank performance, which requires an empirical analysis to identify its impact. In this regard, the purpose of this study is to investigate the relationship between political communication and financial performance of banks accepted in Tehran Stock Exchange and OTC. In this study, in order to test the research hypothesis,...

متن کامل

امنیت هستی‌شناختی و مسائل امنیتی خلیج‌فارس بعد از انقلاب اسلامی ایران

Constructivism theory by employing a humanistic vision to issues has provided the  the opportunity of considering the special characters of human in political studies.  Therefore factors such as identity, benefits, purposes, intentions, and many other issues  found important role in  security Studies. Ontological Security employed this approach to  security matters. This theory seeks to clarify...

متن کامل

TAME: A Threat Assessment Model for the METEORE System

The wide development of the mobile Internet technology is creating the opportunity for companies to utilise Electronic Payment Systems for the delivery of services. Due to that, organisations have been forced to allocate considerable resources for protecting their information assets. Unfortunately the opportunity still exists for systems to be exploited with catastrophic results. Modern securit...

متن کامل

Understanding and Developing a Threat Assessment Model

The wide development of the mobile Internet technology is creating the opportunity for companies to extensively utilise computer systems for the delivery of services. New business models, which rely on electronic payment systems, are emerging and each one is creating a vulnerability to the Critical National Information Infrastructure (CNII). The opportunity for deploying offensive information w...

متن کامل

Using Attacker Capabilities and Motivations in Estimating Security Risk

Risk of a given threat is a function of the likelihood of exercising the threat and the severity of its impacts. This paper proposes incorporating attacker capabilities and motivations in estimating the likelihood of exercising threats. Attacker capability is the ability to use appropriate means (e.g., knowledge, time, expertise, and tools) and opportunity (e.g., enough time to perform the atta...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006