Information warfare: Are you at risk?

被引:6
作者
Elbirt, AJ [1 ]
机构
[1] Univ Massachusetts, Lowell, MA 01854 USA
关键词
D O I
10.1109/MTAS.2004.1251382
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Construction of the Global Information Infrastructure (GII) has been facilitated by the technological advancement of the microprocessor in the areas of speed, performance, power consumption, and cost. The GII is expected to create a global computer network for use in personal, organizational, and governmental communications. The population of technologically advanced countries has grown heavily dependent on the communication networks provided by the GII. As a result, the associated technology and information systems become targets for information warfare attacks. Addressing this issue, government agencies have joined forces with private organizations to create infrastructure protection programs.
引用
收藏
页码:13 / 19
页数:7
相关论文
共 32 条
[1]   Catapults and grappling hooks: The tools and techniques of information warfare [J].
Boulanger, A .
IBM SYSTEMS JOURNAL, 1998, 37 (01) :106-114
[2]  
Burnham D., 1984, RISE COMPUTER STATE
[3]  
CHATURVEDI AR, 2000, P 33 AN HAW INT C SY, V1, P10
[4]  
Edgar S. L., 1997, MORALITY MACHINES PE
[5]   Computer hacking and cyber terrorism: The real threats in the new millennium? [J].
Furnell, SM ;
Warren, MJ .
COMPUTERS & SECURITY, 1999, 18 (01) :28-34
[6]   A cop on the beat: Collecting and appraising intrusion evidence [J].
Goan, T .
COMMUNICATIONS OF THE ACM, 1999, 42 (07) :46-52
[7]   Cyber wars and other threats [J].
Hinde, S .
COMPUTERS & SECURITY, 1998, 17 (02) :115-118
[8]   Surviving information warfare attacks [J].
Jajodia, S ;
Ammann, P ;
McCollum, CD .
COMPUTER, 1999, 32 (04) :57-+
[9]   Trusted recovery [J].
Jajodia, S ;
McCollum, CD ;
Ammann, P .
COMMUNICATIONS OF THE ACM, 1999, 42 (07) :71-75
[10]   A self-extension monitoring for security management [J].
Jang, H ;
Kim, S .
16TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2000, :196-203