Defensive Information Warfare with Non-localizable Command and Control

نویسنده

  • Randy Browne
چکیده

I loosely define "hard" information defenses as those assurance mechanisms that tend more to prevent (rather than recover from) the ill effects of security breaches and which tend to be more static in nature. Similarly, I loosely define "soft" defenses as assurances that tend to rely more on recovery from security breaches and offer a more dynamic/adaptive kind of information protection. Information protection, especially for critical information infrastructure, should balance the use of "hard" and "soft" information defenses owing to their often-complementary characteristics.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Rethinking Defensive Information Warfare

Although the origins of information warfare lie in the defense of critical computer systems, defensive information warfare (DIW) per se has advanced little beyond an information assurance model. Information assurance is an integral part of any military organization’s operations, but it falls far short of meeting the needs for robust defense of critical command-and-control (C2) computer networks...

متن کامل

Beyond Security: A Data Quality Perspective on

Conventional approaches to defensive information warfare (IW) focus primarily on physical security, electronic countermeasures and encryption techniques. These areas focus on preserving system availability and data secrecy. However, these areas control only a small subset of the range of impacts that information warfare attacks can have on information data quality attributes provided to users. ...

متن کامل

Cyber Command and Control: A Military Doctrinal Perspective on Collaborative Situation Awareness for Decision Making

Cyber-space is emerging as the fifth domain of warfare and a crucial operational concern for commercial industry. As such, it requires a command and control system that enables defensive and operational capabilities within cyber-space. This chapter describes a research and development project aimed at discovering solutions for a Cyber Command and Control both for commercial and military environ...

متن کامل

Red Force Interaction in Situated Cognition

Efforts to maximize the impact of network centric warfare (NCW) rely upon the effective integration of human and technological agents. Combat and command and control models must represent the entirety of a network-centric organization, including both humans and non-human components which comprise any complex system. The Dynamic Model of Situated Cognition (DMSC) was introduced by Miller and Sha...

متن کامل

The Analysis of Compound Information Warfare Strategies

The practical defensive and offensive application of Information Warfare most frequently involves the use of complicated compound strategies, in which multichannel and multilayered attacks must be analysed. This paper presents a systematic approach to the analysis problem, which is exploitable for defensive and offensive purposes.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2000