• Corpus ID: 108137786

Information Assurance: Trends in Vulnerabilities, Threats, and Technologies

  title={Information Assurance: Trends in Vulnerabilities, Threats, and Technologies},
  author={Jacques S. Gansler and Hans Binnendijk},
Abstract : One of the missions of the Center for Technology and National Security Policy at National Defense University is to study the transformation of America's military and to explore the consequences of the information revolution. To further this mission, National Defense University, in collaboration with The Center for Public Policy and Private Enterprise of the University of Maryland's School of Public Affairs, brought together leaders in the fields of military and commercial technology… 

A Review on C3I Systems’ Security: Vulnerabilities, Attacks, and Countermeasures

A taxonomy for security vulnerabilities, attack vectors, and countermeasures for C3I systems is proposed and the findings will serve as a guideline for practitioners and researchers to advance the state-of-the-practice and state- of- the-art on the security of C3i systems are proposed.

Network Propagation : The Legal and Technical Dangers of Justifying Active Countermeasures as Retribution for Cyber Attacks

It is argued that the unique nature of networks make active countermeasures a troublesome precedent to set both legally and technically, and the problem of identifying and directing a countermeasure against an attacker is uniquely difficult in network attacks, and allowing forceful countermeasures in.

Measuring the Health of the Global Information Grid

The focus of the project was to design a framework for metrics to assess the health of the GIG, a globally interconnected Department of Defense network that collects, processes, and manages information for warfighters, policymakers, and support personnel.

Evaluation of Information Assurance Requirements in a Net-Centric Army

The requirements and concurrent capabilities necessary for network centric capabilities are examined for this key strategic imperative of future Army operations as part of a joint and coalition force.

An Analysis of Information Assurance Relating to the Department of Defense Radio Frequency Identification (RFID) Passive Network

A historical analysis of Radio Frequency Identification literature was utilized to determine whether the current network design causes any serious security concerns adversaries could exploit and concluded that at the present level of implementation, there is little cause for concern over the security.

Building a Social Dimensional Threat Model from Current and Historic Events of Cyber Attacks

This paper analyzes the expression of such cyber attacks in news media and publications based on past social events, explores the factors in social dimension that triggered the cyber attacks, and map these factors to concepts in a cyber attack domain model.

Mission Command in the Information Age: A Normal Accidents Perspective on Networked Military Operations

Abstract Theory on the use of information technology in military operations assumes that bringing together units in an information network helps units to work together. Decentralized command systems

Addressing synchrony issues of dynamic shared secrets in security protocols

This research addresses synchronisation issues in security protocols for wireless communications. A new class of attacks, termed Suppress-and-Desynchronise (SD) attacks, is introduced. This attack

Modern Militaries and a Network Centric Warfare Approach

Throughout the twentieth century, advancements in technology have coincided with significant developments in the way militaries of the world wage combat. From the use of cavalry units at the outbreak

A Mutual Authentication Protocol with Resynchronisation Capability for Mobile Satellite Communications

A new mutual authentication protocol for satellite communications, incorporating a resynchronisation capability, is proposed to counter the disruptive effects of desynchronisation attacks and establishes its resistance against attacks like replay attacks, dictionary attacks, and des synchronisation attacks.



Applications of Underground Structures for the Protection of Critical Infrastructure

The U.S. President’s Commission on Critical Infrastructure Protection (PCCIP), convened in the wake of the bombing of the Murrah Federal Building in Oklahoma City, concluded that the nation’s

Retrospect of Information Technology's Impact on Society and Warfare: Revolution or Dangerous Hype?

Abstract : What will be the actual potential of the concept of Network Centric Warfare (NCW) as the military progresses from theory to practice? The actual potential of NCW can be best understood by

An Introduction to Evaluating Biometric Systems

Of the biometrics that give the user some control over data acquisition, voice, face, and fingerprint systems have undergone the most study and testing-and therefore occupy the bulk of this discussion.

Maximization of electromagnetic response at a distance

In designing an electromagnetic illuminator which is to excite a system at some distance away from the source (compared to wavelength and illuminator antenna dimensions), there are various factors to

High-power microwave sources and technologies

Foreword by Dr. Delores Etter. Preface. Acknowledgments. List of Contributors. List of Acronyms and Abbreviations. Introduction. HPM Sources: The DOD Perspective. Gigawatt--Class Sources. Pulse

Role of Network and Fault Tree Models for Determining HPM Lethality of Electronic Systems

  • Role of Network and Fault Tree Models for Determining HPM Lethality of Electronic Systems
  • 2001