58 resultados para Siege warfare

em Deakin Research Online - Australia


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Information infrastructures are an eclectic mix of open and closed networks, private and public systems, the Internet, and government, military, and civilian organisations. Significant efforts are required to provide infrastructure protection, increase cooperation between sectors, and identify points of responsibility. The threats to infrastructures are many and various, and are increasing daily: information warfare, hackers, terrorists, criminals, activists, and even competing organisations all pose significant threats that cannot be sufficiently dealt with using the current infrastructure model. We present a National Information Infrastructure model that is based on defence against threats such as information warfare.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Research into Intelligent Agent (IA) technology and how it can assist computer systems in the autonomous completion of common office and home computing tasks is extremely widespread. The use oflA's is becoming more feasible as the functionality moves Into line with what users require for their everyday computing needs. However, this does not mean that IA technology cannot be exploited or developed for use in a malicious manner, such as within an Information Waifare (IW) scenario, where systems may be attacked autonomously by agent system implem-entations. This paper will discuss tne cilrrenlStcite Ofmalicious use of lA's as well as focusing on attack techniques, the difficulties brought about by such attacks as well as security methods, both proactive and reactive, that could be instated within compromised or sensitive systems.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper examines the ethics of the practice of information warfare at both the national and corporate levels. Initially examining the present and past actions of individual hackers, it moves to the more organised, future military and economic warfare scenarios. It examines the lack of legal or policy initiatives in this area.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The continuing erosion of civil liberties in Western democracies, and in particular Australia, as a response to the threat of terrorist attack - the position taken that laws eroding civil liberties will ultimately fail in its attempt to combat terrorist activity while adding to human insecurity and violence - counter-terrorism measures resulting in the militarisation of law enforcement and provoking terrorism - linking counter-terrorism with globalisation.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

With information warfare (IW) becoming a reality, the need for a new security methodology to deal with the new and unique attack threats and vulnerabilities associated with the new information technology security paradigm. With the shift from computer security to information warfare, logical transformation models (LTMS) were looked at as a solution to quantifying information system requirements. The paper will introduce the concepts involved with fourth generational models and it's application to IW. The basic advantages and disadvantages will also be discussed and presented.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper examines the fundamental concepts needed to understand the broad spectrum of activities encompassed by the Information Warfare phenomenon. It provides a theoretical background to these activities, and examines the context in which these are most effective.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Information is the glue in any organization. It is needed for policy, decision-making, control, and co-ordination. If an organisation's information systems are disrupted or destroyed, then damage to the whole inevitably follows. This paper uses a proven systemic, analytic framework the Viable System Model (VSM) - in a functionalist mode, to analyse the vulnerabilities of an organisation's information resources to this form of aggression. It examines the tactics available, and where they can be used to effectively attack an organisation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This text introduces the concepts of information warfare from a non-military, organizational perspective. It is designed to stimulate managers to develop policies, strategies, and tactics for the aggressive use and defence of their data and knowledge base. The book covers the full gambit of information warfare subjects from the direct attack on computer systems to the more subtle psychological technique of perception management. It provides the framework needed to build management strategies in this area. The topics covered include the basics of information warfare, corporate intelligence systems, the use of deception, security of systems, modes of attack, a methodology to develop defensive measures, plus specific issues associated with information warfare.

Relevância:

20.00% 20.00%

Publicador: