Information Assurance: Trends in Vulnerabilities, Threats, and Technologies
@inproceedings{Gansler2004InformationAT, title={Information Assurance: Trends in Vulnerabilities, Threats, and Technologies}, author={Jacques S. Gansler and Hans Binnendijk}, year={2004} }
Abstract : One of the missions of the Center for Technology and National Security Policy at National Defense University is to study the transformation of America's military and to explore the consequences of the information revolution. To further this mission, National Defense University, in collaboration with The Center for Public Policy and Private Enterprise of the University of Maryland's School of Public Affairs, brought together leaders in the fields of military and commercial technology…
Figures from this paper
17 Citations
A Review on C3I Systems’ Security: Vulnerabilities, Attacks, and Countermeasures
- Computer ScienceACM Computing Surveys
- 2022
A taxonomy for security vulnerabilities, attack vectors, and countermeasures for C3I systems is proposed and the findings will serve as a guideline for practitioners and researchers to advance the state-of-the-practice and state- of- the-art on the security of C3i systems are proposed.
Network Propagation : The Legal and Technical Dangers of Justifying Active Countermeasures as Retribution for Cyber Attacks
- Computer Science
- 2015
It is argued that the unique nature of networks make active countermeasures a troublesome precedent to set both legally and technically, and the problem of identifying and directing a countermeasure against an attacker is uniquely difficult in network attacks, and allowing forceful countermeasures in.
Measuring the Health of the Global Information Grid
- Computer Science
- 2009
The focus of the project was to design a framework for metrics to assess the health of the GIG, a globally interconnected Department of Defense network that collects, processes, and manages information for warfighters, policymakers, and support personnel.
Evaluation of Information Assurance Requirements in a Net-Centric Army
- Computer Science
- 2005
The requirements and concurrent capabilities necessary for network centric capabilities are examined for this key strategic imperative of future Army operations as part of a joint and coalition force.
An Analysis of Information Assurance Relating to the Department of Defense Radio Frequency Identification (RFID) Passive Network
- Computer Science
- 2005
A historical analysis of Radio Frequency Identification literature was utilized to determine whether the current network design causes any serious security concerns adversaries could exploit and concluded that at the present level of implementation, there is little cause for concern over the security.
Building a Social Dimensional Threat Model from Current and Historic Events of Cyber Attacks
- Computer Science2010 IEEE Second International Conference on Social Computing
- 2010
This paper analyzes the expression of such cyber attacks in news media and publications based on past social events, explores the factors in social dimension that triggered the cyber attacks, and map these factors to concepts in a cyber attack domain model.
Mission Command in the Information Age: A Normal Accidents Perspective on Networked Military Operations
- Engineering
- 2015
Abstract Theory on the use of information technology in military operations assumes that bringing together units in an information network helps units to work together. Decentralized command systems…
Addressing synchrony issues of dynamic shared secrets in security protocols
- Computer Science
- 2011
This research addresses synchronisation issues in security protocols for wireless communications. A new class of attacks, termed Suppress-and-Desynchronise (SD) attacks, is introduced. This attack…
Modern Militaries and a Network Centric Warfare Approach
- Political Science
- 2020
Throughout the twentieth century, advancements in technology have coincided with significant developments in the way militaries of the world wage combat. From the use of cavalry units at the outbreak…
A Mutual Authentication Protocol with Resynchronisation Capability for Mobile Satellite Communications
- Computer ScienceInt. J. Inf. Secur. Priv.
- 2011
A new mutual authentication protocol for satellite communications, incorporating a resynchronisation capability, is proposed to counter the disruptive effects of desynchronisation attacks and establishes its resistance against attacks like replay attacks, dictionary attacks, and des synchronisation attacks.
References
SHOWING 1-6 OF 6 REFERENCES
Applications of Underground Structures for the Protection of Critical Infrastructure
- Political Science
- 2002
The U.S. President’s Commission on Critical Infrastructure Protection (PCCIP), convened in the wake of the bombing of the Murrah Federal Building in Oklahoma City, concluded that the nation’s…
Retrospect of Information Technology's Impact on Society and Warfare: Revolution or Dangerous Hype?
- Political Science
- 2002
Abstract : What will be the actual potential of the concept of Network Centric Warfare (NCW) as the military progresses from theory to practice? The actual potential of NCW can be best understood by…
An Introduction to Evaluating Biometric Systems
- Computer ScienceComputer
- 2000
Of the biometrics that give the user some control over data acquisition, voice, face, and fingerprint systems have undergone the most study and testing-and therefore occupy the bulk of this discussion.
Maximization of electromagnetic response at a distance
- Geology
- 1992
In designing an electromagnetic illuminator which is to excite a system at some distance away from the source (compared to wavelength and illuminator antenna dimensions), there are various factors to…
High-power microwave sources and technologies
- Physics
- 2001
Foreword by Dr. Delores Etter. Preface. Acknowledgments. List of Contributors. List of Acronyms and Abbreviations. Introduction. HPM Sources: The DOD Perspective. Gigawatt--Class Sources. Pulse…
Role of Network and Fault Tree Models for Determining HPM Lethality of Electronic Systems
- Role of Network and Fault Tree Models for Determining HPM Lethality of Electronic Systems
- 2001