Information warfare and security dorothy denning addison wesley longman 1 jacob way, reading, massachusetts 01867 and acm association for computing machinery press 1515 broadway, new york, ny 100365701. For some general discussions on information warfare. But if denning ever wants to chuck it all and opt for an honest living of, say, writing horror stories, her most recent book, information warfare and security. Dorothy denning is one of the worlds most respected computer security experts. Information warfare research paper overview i n f o r m. Protecting your personal security in the electronic age, thunders mouth press, 2nd ed, 1996 isbn 15602528. Issues for congress congressional research service summary information warfare is hardly a new endeavor. Denning, a pioneer in computer security, provides in this book a framework for understanding and dealing with information based threats. Information warfare as future weapon of massdisruption. The term is used to cover a broad spectrum of activity but. Information warfare and security dorothy elizabeth. Information warfare and security edition 1 by dorothy e. The author is clearly an expert in security and manages to touch upon all the major information security topics.
Problem statement information warfare is actions taken to affect adversary information and information systems while defending ones own information and information systems. Countering cyberspace scofflaws addison wesley, 1998. No nation has made more effective use of the information revolution than the united states, but none is more dependent on information technology. Such a wide spectrum of uses makes it difficult to identify the peculiarities of this. Denning, a pioneer in computer security, provides in this book a framework for understanding and dealing with informationbased threats. As a result, it is not clear when information warfare begins, ends, and how strong or destructive it is. Shes also the author of the nowclassic cryptography and data security addisonwesley, 1982 and a professor of computer science at georgetown university. Graduate school of operational and information sciences gsois. Maarten vanhorenbeeck is currently undertaking a masters degree in information security and intelligence at edith cowan university, australia. In particular when does such an attack cross the boundary from a mere criminal act to an act of war. Information warfare is the manipulation of information trusted by a target without the targets awareness so that the target will make decisions against their interest but in the. Types of information warfare the form of information warfare is the way of its exposure and it is expressed through the structure of events and activities related to the processes that take place in it. Liptak president, info2go the print article appears in the october 2009 issue of searcher.
Aerospace power chronicles, contributors corner, 1998. Schmitt d espite ongoing debates about the existence, or lack thereof, of a revolution in military affairs, it is undeniable that twentyfirst century warfare will differ dramatically from that which characterized the twentieth century. Computer network attack and jus in bello by michael n. Teaching information warfare at georgetown university dorothy e. Vulnerabilities and policy issues for congress introduction the u. She is the author of a classic book in the field, cryptography and data security, a coeditor with peter j. He is a service delivery manager with global information security services specialist cybertrust. He is a member of australian standards committee it124 security technique s and is the australian representative on ifip 11 wg11 security management. Denning has shared her special expertise on encryption in testimony. Denning is professor of computer science at georgetown university. Denning 4 in his work information warfare and security noted. Page after page of hacks, cracks, phreaks, and psyopts by everyone.
Cybersecurity threats, information warfare and critical. You see, part of what denning has done in information warfare and security is chronicle what seems to be just about every breach in computer security over the past few years. Information warfare and security request pdf researchgate. The lowtech side of information warfare captain alex berger. Dorothy denning, information warfare and security, addisonwesley 1998 isbn 0201433036. Information warfare is a number of operations that have the purpose to gain or operate the information resources. The book provides a good overview of information warfare. Futures studies generate foresight about the manifestation of information warfare in the 2030s as an upcoming national security threat in africa. Information warfare and information revolution icts are used in several combat activities, from cyber attacks to the deployment of robotic weapons and the management of communications among the fighting units. According to denning, information warfare consists of those actions intended to protect, exploit, corrupt, deny, or destroy information or information resources in order to. Libicki with billions of computers in existence, cyberspace, the virtual world created when they are connected, is said to be the new medium of power. Alexander the great used cultural assimilation to subdue dissent and maintain conquered lands.
Chapter 3, playgrounds to battlegrounds, situates information warfare within four domains of human activity. Hence, china is more convinced than ever that as far as the pla is concerned, a military revolution with information warfare as the core has reached the stage where efforts must be made to catch up with. Dorothy elizabeth denning, born august 12, 1945, is a usamerican information security researcher known for latticebased access control lbac, intrusion detection systems ids, and other cyber security innovations. Conquest in cyberspace national security and information warfare martin c. The aim of the journal of information warfare is to provide the definitive publication for the latest research in the critical areas of information warfare, information operations, cyber crime and cyber warfare. Iws is an online resource that aims to stimulate debate about a range of subjects from information security to information operations and ecommerce. Information warfare and electronic warfare are of key importance, while fighting on the ground can only serve to exploit the victory. Denning, a pioneer in computer security, provides a framework for understanding and dealing with information based threats. It is divided into three sections, the introduction, offensive information warfare and finally defensive information warfare. Leading authority on cybercrime, information warfare the longtime computer science professor is one of the worlds top authorities. Conquest in cyberspace national security and information.
Denning is author of information warfare and security addison wesley, 1999, cryptography and data security addison wesley, 1982 and over 100 articles. Information warfare and security book by dorothy e denning. Strategic information warfare and defense the rma debate. Matthew has published numerous pages in the area of information warfare and is coauthor of information warfare. Information warfare iw is a concept involving the battlespace use and management of information and communication technology ict in pursuit of a competitive advantage over an opponent. Denning this is a comprehensive and detailed view of information warfare. It presents methods, laws, and case examples stressing actual incidents to illustrate such instances. Since the beginning of the twentyfirst century, two new threats have received increased attention.
Supplementary readings were either found on the world wide web or offered on reserve in the library. Download pdf cyber security and information warfare book full free. Information operations is a category of direct and indirect support operations for the united states military. Information warfare and security by denning, dorothy e. Chapter 2, a theory of information warfare, presents a model of information warfare in terms of four main elements. Information warfare can target or exploit any type of information resourcesphysical environments, print and storage media, broadcast media, telecommunications, and computers and computer networks. An introduction to information operations usaf air command and staff college, 1998. Denning and others published information warfare and security find, read and cite all the research you need on. Strategic targets in the united states may be just as vulnerable to attack as intheater command, control, communications, and intelligence c3i targets. What individuals, corporations, and governments need to know about. Information warfare and nuclear preemption stephen j. Information warfare research paper overview i n f o r m at. Information warfare and related ethical issues sam nitzberg. Emeritus distinguished professor, department of defense analysis naval postgraduate school.
Senate and house of representatives on encryption, is a. Information warfare is the manipulation of information trusted by a target without the targets awareness so that the target will make decisions against their interest but in the interest of the one conducting information warfare. Information warfare and security has 1 available editions to buy at half price books marketplace same low prices, bigger selection, more fun. Denning, information warfare and security1999 23 information warfare consists of offensive and defensive operations against information resources of a winlose nature. Pearson information warfare and security dorothy e.
Paper presented at the 21st national systems security conference, hyatt regency crystal city, arlington, va, 58 feb 1998. Inducted into the national cyber security hall of fame in 2012, she is now emeritus distinguished professor. It summarizes some of the activity in each of the areas. Countering cyberspace scofflaws, and the author of 100 papers on computer security. The people thinking hardest about warfare in the future know that some of the most important combat of tomorrow will take place on the media battlefield. Information warfare and security and over 140 articles. Information warfare is an emerging threat which is developing into a significant future global security challenge, especially as the relationship between information and power is strengthened. To protect american security, then, military leaders and defense policymakers must understand the information revolution. By definition in joint publication 3, io are described as the integrated employment of electronic warfare ew, computer network operations cno, psychological operations psyop, military deception mildec, and operations security opsec, in concert with specified supporting. While it may appear that these two threats have little in common, they share several characteristics that have significant implications for international security.
Information warfare and security guide books acm digital library. Pdf cyber security and information warfare download full. The jump into the information and communication technology revolution made cyber warfare an essential component of iw measures. Information warfare and security, acm sigmod record 10. According to dorothy denning,viii cyber terrorism is the convergence of terrorism and. Our nations growing dependency on information and information based technologies creates tremendous vulnerabilities in our national security infrastructure. She describes these attacks with astonishing, real examples, as in her analysis. The journal is published four times a year and is available in traditional hard copy or pdf format. This book offers an overview of the ethical problems posed by information warfare, and of the different approaches and methods used to solve them, in order to provide the reader with a better grasp of the ethical conundrums posed by this new form of warfare. This is a comprehensive and detailed view of information. Information warfare and security information warfare and security jagadish, h. But if denning ever wants to chuck it all and opt for an honest living of, say, writing horror stories, her most recent book, information warfare and security, has all the source material she will ever need.
John arquilla and david ronfeldt, in athenas camp, rand 1997. It relates information warfare to information security and information assurance. Denning information warfare and security by dorothy e. A philosophical perspective 111 example, rests on the recognition of the military and industrial forces of a state. Terrorism, crime, and national security, is a 3credit. Information warfare and security, dorothy denning, 1999. Dec 01, 2001 information warfare and security information warfare and security jagadish, h. Offensive and defensive information warfare is expressed in terms of actors, targets, methods, technologies, outcomes, policies, and laws. Strategic information warfare and postcold war strategy our exercise scenario highlighted from the start a fundamental aspect of strategic information warfare. Publication date 1999 topics information warfare, information warfare united states. In the battle of thermopylae in 480 bc, persian ruler xerxes used intimidation tactics to break the will of greek citystates. Final rule, searcher the magazine for database professionals octoberl 2009 page 1 information warfare part 1. The volume is divided into three parts, each comprising four chapters. Information warfare and security by dorothy elizabeth robling denning.
538 859 1107 941 234 814 1114 279 1597 308 1577 826 807 954 529 382 1218 539 1000 523 1646 1305 1001 137 1272 1208 1498 1519 1272 1480 148 583 1127 176 190 664 463 989 992