Information Security Model to Military Organizations in Environment of Information Warfare

被引:0
作者
Martins, Jose [1 ]
Santos, Henrique [2 ]
Nunes, Paulo [1 ]
Silva, Rui [3 ]
机构
[1] CINAMIL, Mil Acad, Lisbon, Portugal
[2] Univ Minho, Dept Informat Syst, Guimaraes, Portugal
[3] INESC ID, Lab UbiNET IPBeja, Lisbon, Portugal
来源
PROCEEDINGS OF THE 11TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY | 2012年
关键词
information security management; information assurance; information security model; general morphological analysis; information warfare;
D O I
暂无
中图分类号
G25 [图书馆学、图书馆事业]; G35 [情报学、情报工作];
学科分类号
1205 ; 120501 ;
摘要
This article proposes a model to maximize the information security within military organizations, inserted in environment of Information Warfare. It attempts to answer three fundamental questions, what to do, why and how? to protect the information and Information Systems of possible incidents related to the information security that may affect confidentiality, integrity and availability of information. The main variables to be considered are defined and their possible values are proposed. These variables are obtained by means of an interpretative epistemological approach, through a literature review, the use of research methods of Contents Analysis, Focus Group and the General Morphologic Analysis method. To respond in an integrated manner to the three questions above, the model considers the possible incidents of information security in Information Systems, taking into account primarily the main components of the security risks of Information Systems that collect, store, process, transmit and disseminate the information. Its operation is guided by the military concepts of Information Warfare, Information Assurance, the most important principles of war applied to Defensive Operations and the military doctrine of Information Operations. Given the type of problem identified in the study, focusing primarily on the analysis of scenarios of information security incidents and interconnection with the planning and selection of security controls, the method used is the General Morphological Analysis. This method allows for the prediction of possible scenarios of incidents related to information security at the organizational level, which results in the selection of the most efficient solution of security controls, to maximize the security of information. Information security must guarantee confidentiality, integrity and availability of information and seeks to contribute, by means of the operational implementation of the military concept of Information Assurance, to achieve the information superiority.
引用
收藏
页码:172 / 179
页数:8
相关论文
共 41 条
[31]  
Martins J., 2010, 6 INT C GLOB SEC SAF
[32]  
Mayer N., 2009, MODEL BASED MANAGEME
[33]   Competitive intelligence: Preparing for the information war [J].
McCrohan, KF .
LONG RANGE PLANNING, 1998, 31 (04) :586-593
[34]  
NATO, 2009, Allied Joint Doctrine for Information Operations (AJP 3-13)
[35]  
Nnolim A., 2008, INFORM SYSTEMS ED J, V6, P31
[36]  
Pereira, 2010, 9 EUR C INF WAR SEC
[37]  
Pfleeger C. P., 2007, SECURIY COMPUTING
[38]  
Ritchey T, 2011, RISK GOV SOC, V17, P1, DOI 10.1007/978-3-642-19653-9
[39]  
Vermeulen C., 2002, INFORM MANAGEMENT CO, V10, P119, DOI DOI 10.1108/09685220210431872
[40]  
Waltz E., 1998, Information Warfare. Principles and Operations