|
Surviving Information Warfare Attacks
1999 Award Winner
Sushil Jajodia, The MITRE Corporation and George Mason University
Paul Ammann, George Mason University
Catherine D. McCollum, The MITRE Corporation
ABSTRACT
The past few years have seen governmental, military, and commercial organizations widely adopt Web-based commercial technologies because of their convenience, ease of use, and ability to take advantage of rapid advances in the commercial market. With this increasing reliance on internetworked computer resources comes an increasing vulnerability to information warfare. Although it can range from psychological operations to physical attacks on information systems, the aspect of information warfare that most concerns computer professionals is defending against the use of computing technology to disrupt or disable the computerized functions and resources that support an organization's operations.
An information warfare attacker's goal is to damage an organization by disrupting its information systems. The specific target of an attack may be the system itself or its data. Although attacks that bring down the system are severe and dramatic, they must be well timed to achieve the attacker's goal, because immediate and concentrated attention will be applied to restoring system operation. That accomplished, a thorough diagnosis will precede installation of measures designed to prevent further such attacks.

Publication
Published in 1999. IEEE Computer, Vol. 15, No. 4, pp. 57-63.
This material is posted here with permission of the IEEE. Such permission of the IEEE does not in anyway imply IEEE endorsement of any of MITRE Corporation's products or services. Internal or personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution must be obtained from the IEEE by sending a blank email message to pubs-permissions@ieee.org. By choosing to view this document, you agree to all provisions of the copyright laws protecting it.
Additional Search Keywords
n/a
|