Defensive Information Warfare with Non-localizable Command and Control
نویسنده
چکیده
I loosely define "hard" information defenses as those assurance mechanisms that tend more to prevent (rather than recover from) the ill effects of security breaches and which tend to be more static in nature. Similarly, I loosely define "soft" defenses as assurances that tend to rely more on recovery from security breaches and offer a more dynamic/adaptive kind of information protection. Information protection, especially for critical information infrastructure, should balance the use of "hard" and "soft" information defenses owing to their often-complementary characteristics.
منابع مشابه
Rethinking Defensive Information Warfare
Although the origins of information warfare lie in the defense of critical computer systems, defensive information warfare (DIW) per se has advanced little beyond an information assurance model. Information assurance is an integral part of any military organization’s operations, but it falls far short of meeting the needs for robust defense of critical command-and-control (C2) computer networks...
متن کاملBeyond Security: A Data Quality Perspective on
Conventional approaches to defensive information warfare (IW) focus primarily on physical security, electronic countermeasures and encryption techniques. These areas focus on preserving system availability and data secrecy. However, these areas control only a small subset of the range of impacts that information warfare attacks can have on information data quality attributes provided to users. ...
متن کاملCyber Command and Control: A Military Doctrinal Perspective on Collaborative Situation Awareness for Decision Making
Cyber-space is emerging as the fifth domain of warfare and a crucial operational concern for commercial industry. As such, it requires a command and control system that enables defensive and operational capabilities within cyber-space. This chapter describes a research and development project aimed at discovering solutions for a Cyber Command and Control both for commercial and military environ...
متن کاملRed Force Interaction in Situated Cognition
Efforts to maximize the impact of network centric warfare (NCW) rely upon the effective integration of human and technological agents. Combat and command and control models must represent the entirety of a network-centric organization, including both humans and non-human components which comprise any complex system. The Dynamic Model of Situated Cognition (DMSC) was introduced by Miller and Sha...
متن کاملThe Analysis of Compound Information Warfare Strategies
The practical defensive and offensive application of Information Warfare most frequently involves the use of complicated compound strategies, in which multichannel and multilayered attacks must be analysed. This paper presents a systematic approach to the analysis problem, which is exploitable for defensive and offensive purposes.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2000