InfoWarCon: International Conference on Information Warfare: Defining the European Perspective: Proceedings

Cover
DIANE Publishing, 1996 - 346 Seiten
0 Rezensionen
Rezensionen werden nicht überprüft, Google sucht jedoch gezielt nach gefälschten Inhalten und entfernt diese
Papers: the strategic approach to home defense; information warfare: chaos on the electronic superhighway; east versus west: military views of information warfare; dealing with Internet intruders in emergency mode: an IBM perspective; hackers: national resources or cyber-criminals?; creating smart nations through national information strategies: intelligence and security issues; convergence of military and commercial vulnerabilities; societal impact of information warfare; security management: safety in cyberspace; industrial espionage: an update, etc.
 

Was andere dazu sagen - Rezension schreiben

Es wurden keine Rezensionen gefunden.

Häufige Begriffe und Wortgruppen

Beliebte Passagen

Seite 253 - Your primary object will be the progressive destruction and dislocation of the German military, industrial, and economic system, and the undermining of the morale of the German people to a point •where their capacity for armed resistance is fatally weakened.
Seite 88 - The integrated use of operations security, military deception, psychological operations, electronic warfare, and physical destruction, mutually supported by intelligence, to deny information to, influence, degrade, or destroy adversary command and control capabilities, while protecting friendly command and control capabilities against such actions.
Seite 39 - The attack was limited to four man-days of effort, requiring the attackers to be more "bold" than is normally required. A real Social Engineering attack would be accomplished over weeks, if not months. Since the potential reward for an attacker would be very great, a real attack would have included several physical visits to the company's offices and possibly even obtaining a job at the company. 2.0 THE ATTACK Initially, the attackers performed a search on Internet library resources to obtain an...
Seite 50 - Commercial aircraft, natural gas pipelines, the electric power grid, offshore oil rigs, and computers storing government and corporate records are examples of sabotage-prone targets whose destruction would have derivative effects of far higher intensity than their primary losses would suggest . . . Thirty years ago terrorists could not have obtained extraordinary leverage. Today, however, the foci of communications, production, and distribution are relatively small in number and highly vulnerable...
Seite 270 - ... (The lights have not stayed off in Haiphong, and even if they had, electric lights are in no sense essential to the Communist war effort.) And against this distinctly marginal impact we have to weigh the fact that strategic bombing does tend to divide the US, to distract us all from the real struggle in the South, and to accentuate the unease and distemper which surround the war in Vietnam, both at home and abroad.
Seite 185 - ... gas" is simple and unambiguous. Gas only on military personnel; gas used only by defending forces; gas only when carried by vehicle or projectile; no gas without warning— a variety of limits is conceivable; some may make sense, and many might have been more impartial to the outcome of the war. But there is a simplicity to "no gas...
Seite 185 - no gas" that makes it almost uniquely a focus for agreement when each side can only conjecture at what alternative rules the other side would propose and when failure at coordination on the first try may spoil the chances for acquiescence in any limits at all.
Seite 49 - PLO' virus was developed at Hebrew University in Israel; in Japan, groups have attacked the computerized control systems for commuter trains, paralyzing major cities for hours; the Italian Red Brigade's manifesto specified the destruction of computer systems and installations as an objective for 'striking at the heart of the state' (Fites, Johnson and Kratz, 1993, p.
Seite 88 - actions taken to achieve information superiority in support of national military strategy by affecting adversary information and information systems while leveraging and protecting our information and information systems.

Bibliografische Informationen