Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
1999, Communications of The ACM
…
3 pages
1 file
AI-generated Abstract
The paper discusses the challenges and intricacies of defensive information warfare, focusing on the necessity for robust detection and response mechanisms against malicious attacks on information systems. It highlights the vulnerabilities inherent in distributed computing environments and emphasizes the importance of vigilance in identifying potential intrusions. The emerging field of computer and information system forensics is explored, alongside methods for damage assessment and recovery post-attack. The ongoing research and technological advancements in defensive strategies are underscored, reflecting the dynamic landscape of cybersecurity.
The impact of computer and communications systems in recent decades has not bypassed the national security of states in general, and the State of Israel in particular. Most systems in developed societies rely on computer and information infrastructures, and this growing dependence on information and communication technologies means that a blow to computers and information flow processes is liable to disrupt, paralyze, and sometimes even cause substantive physical damage to essential systems. Computer-based capabilities and their near-global ubiquity expose states to harm in cyberspace by various elements, including hostile countries, terrorist organizations, criminal elements, and even individuals driven by personal challenges or anarchist motives. The threat is particularly acute as management, control, and monitoring systems can be disrupted through changes to a computer program, and no physical attack is needed. Thus, it stands to reason that the face of future conflicts will be transformed beyond recognition. The strength of a sovereign state is a function of economic, societal, and scientific strength combined with military strength, and the purpose of the military strength is to protect the state's territory and its citizens so that they can cultivate and maintain economic strength. The vulnerability of computers and communications systems to cyber attacks entails a dramatic change in the concept of military strength. For the first time, it is possible to mortally wound national economic strength by paralyzing economic and civilian systems without using firepower and force maneuvers. Thus, the ability of states to operate in cyberspace for Dr. Col. (ret.) Gabi Siboni is head of the Military and Strategic Affairs Program at INSS and head of the Cyber Warfare Program at INSS, supported by the Philadelphia-based Joseph and Jeanetter Neubauer Foundation.
Centre for Land Warfare Issue Brief, 2018
Information Warfare, uses elements of information and technology to disrupt thought processes and paralyze an adversary with non- kinetic mean, violating sovereignty and achieving objectives without using conventional forces. We need to defend against such warfare and develop capability to strike back in similar coin. The conceptual construct of National Security itself has undergone a transformation in the digital era, hence there is a need to redefine the concept of National Security and review security systems in the era of Information Warfare. Information Security has to include both defensive and offensive capabilities in the Information Domain and including IW as an essential part of National Security is the first step towards waging the war in infospace
Defence and Security Alert, 2013
Computer Fraud & Security, 2006
The Department of Defense has adopted Joint Vision 2020 as its approach to conflict in the future. Both Information Superiority and Decision Superiority are key components of JV2020, and future warfighting plans will be increasingly reliant upon high-speed interconnected information networks to identify targets, create and transmit plans, disseminate and share information, and carry out battles. This construct for the military is based on the ability to detect and track the enemy, move that information across continents, integrate and analyze it, then decide and take action, often under very tight time constraints; sometimes within minutes. It is the protection of this information upon which this Defense Science Board Task Force concentrated its efforts. The threats to the DoD infrastructure are very real, non-traditional and highly diversified. Within the past year, the Love Bug Virus spread to over one million computers in just five hours: far more rapidly than defenses or law enforcement could respond. Attacks vary widely from those perpetrated by trusted insiders, to remote attacks by individuals, organized groups, or nation states, employing new approaches we do not yet understand. China has made clear its intention to use Information Operations (warfare) as an asymmetric response in any conflict with the United States. Various components of Information Operations, including psychological operations, computer network attack, and computer network defense were used during the Kosovo crisis. More recently, both the Israelis and the Palestinians used cyber attacks as an integral part of heightened conflict in the Middle East. Furthermore, those attacks were magnified by the participation of thousands of civilians "called to cyber arms" by their colleagues. The vulnerabilities of these United States are greater than ever before, and we know that over twenty countries already have or are developing computer attack capabilities. Moreover, the Department of Defense should consider existing viruses and "hacker" attacks to be to real "Information Operations or Warfare", what early aviation was to Air Power. In other words, we have not seen anything yet! And the importance of this is magnified by the increased reliance the DoD places on having just the right information at the right place, at the right time: JV2020!
Computing & Control Engineering Journal, 2001
Some of the accounts of information warfare carried by the media have been exaggerated or inaccurate, but this must not deflect us from addressing the crucial issues of defining, developing and deploying critical infrastructure protection policies and strategies.
Journal of Strategic Security, 2012
Colarik is an independent consultant, author, researcher, and inventor of information security technologies. He has published multiple security books and publications in the areas of cyber terrorism, information warfare, and cyber security. He has made presentations before a host of groups and organizations; has appeared on syndicated TV and radio shows such as Fox News, The 700 Club, and Coast to Coast; and is a Fox News contributing cyber security and terrorism expert. Dr. Colarik's research interests involve technology's impact on social, political, legal, and economic structures in society; the design and implementation of secure communication systems; and the evolving applications and consequences of the global information infrastructure on businesses, governments, and individuals. For more information on Dr. Colarik, visit his website at: http://www.AndrewColarik.com. Dr. Lech Janczewski has over thirty-five years' experience in information technology. He was managing director of the largest IBM installation in Poland, and project manager of the first computing center in Nigeria.
0200, Day 1. Network operations centers on the east and west coasts of the United States are receiving a continual stream of inputs reporting their constituent mail servers are shutting down, from an apparent denial of service attack. Similar activities are noted throughout the Federal sector at US Government agencies nationwide.
Nations may defend their freedom of Information and availability of their Information and Communications Technology Services by either Isolation or Habituation, which are both applicable but require totally different structures, culture and governance. Information Operations are not only state level measures, but can be utilized at very low levels and by small entities. It requires multilevel preparations of defence executed together in public-private-voluntary sector alliance extending over national borders. Unlike conventional military operations information operations are ongoing at strategic, operational and tactical levels even in peace time. Published in Proceedings of the 2nd BCS International IT Conference 2014. Accessible from eWiC http://ewic.bcs.org/content/ConWebDoc/54268
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.
Computer Technology and Application, 2015
Policy Studies, 2010
Advances in information security, 2021
Scientia Militaria - South African Journal of Military Studies, 2011
Concepts, Methodologies, Tools, and Applications, 2014