Preview

Cyber Warfare/Motivations

Powerful Essays
Open Document
Open Document
1841 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cyber Warfare/Motivations
Gunner Church
Cyber Warfare/Motivations

The search for information superiority is not new. Sun Tzu 's observation to "Know the enemy and know yourself; in a hundred battles you will never be in peril" is well-known and timelessly accurate. Scouting the enemy in order to gain advantage from knowing his dispositions (and simultaneously protecting against his scouts) is likewise ancient. Intuitively, this task is also the essence of practicality. In this age, old quest for knowledge of the enemy, history abounds with examples of commanders who either gained or lost the race for information superiority to decisive effect. We must first discuss what is new about the quest for information superiority that makes it different and relevant for today 's war fighters. The difference is in the character of the dawning 'information age. '
A new age is upon us. In this new age, information flows like water. In some form it is everywhere, and like water, it is essential. Information as a concept is old, but how we manipulate, transfer, collate, store, and use it is changing with the force of a tidal wave. Information as water has become a raging torrent. This change is revolutionary in impact and scope. Modern times are transitioning to what is being hailed as 'The Information Age. ' information warfare is how wars will be won in the future and that the key to operational success by military forces in information war is in the strategy and target set known as Command and Control Warfare. The information age posts information war and a fundamental shift in how wars will be waged in the future. In the course of analyzing how military forces gain information superiority, the idea that all military information invariably follows a path from 'sensor to decision-maker to shooter ' is developed. This "military information path" idea illuminates the specific fundamental changes and corresponding impacts on warfare in the information age. From these 'changes and impacts '



References: Easttom, C., "Computer Security Fundamentals (2nd Edition)" (2011)., New York, Pearson Press, Krutz, Ronald L.; Russell Dean Vines (2003). The Information Security Systems Prep Guide (Gold Edition ed.). Indianapolis, IN: Wiley. Layton, Timothy P. (2007). Information Security: Design, Implementation, Measurement, and Compliance. Boca Raton, FL: Auerbach publications. Anderson, K.,(2006)., "IT Security Professionals Must Evolve for Changing Market", SC Magazine, October 12, 2006. McNab, Chris (2004). Network Security Assessment. Sebastopol, CA: O 'Reilly Peltier, Thomas R. (2001). Information Security Risk Analysis. Boca Raton, FL: Auerbach publications. Aceituno, V., (2005), "On Information Security Paradigms",.,Woecester,Chicago, Manpack press. Dhillon, G., (2007), "Principles of Information Systems Security: text and cases", John Wiley & Sons. Depart of Homeland Security’s Role in Critical Infrastructure Protection Retrieved from http://www.us-cert.gov/control_systems/csthreats.html

You May Also Find These Documents Helpful

  • Better Essays

    Whitman, M., & Mattord, H. (2004). Information Security Policy. In Management of information security(Fourth ed., p. 154). Boston, Mass.: Thomson Course…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Better Essays

    Swanson, M. (2006, February). Guide for Developing Security Plans for Federal Information Systems. Retrieved from http://csrc.nist.gov/publications/nistpubs/800-18-Rev1/sp800-18-Rev1-final.pdf…

    • 4134 Words
    • 12 Pages
    Better Essays
  • Powerful Essays

    Riordan Security Issues

    • 1371 Words
    • 6 Pages

    Whitman, M. E., & Mattord, H. (2004). Principles of Information Security. [University of Phoenix Custom Edition e-Text]. , : Course Technology. Retrieved September 15, 2009, from University of Phoenix, CMGT440.…

    • 1371 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    INF 325 Week 1: A Case Study

    • 2472 Words
    • 10 Pages

    Olzak, T. & Bunter, B. (2010, May 07). Security basics - components of security policies. Bright…

    • 2472 Words
    • 10 Pages
    Powerful Essays
  • Better Essays

    Cmgt400 Week3

    • 1493 Words
    • 6 Pages

    References: 1. (2010). Principles of Computer Security: CompTIA Security+ and Beyond (2nd ed.). : McGraw-Hill.…

    • 1493 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    Mccc Study Guide

    • 1046 Words
    • 5 Pages

    Preparation ⁃ Security ⁃ Disruption ⁃ Massing Effects ⁃ Flexibility 6. CHARACTERISTICS OF OFFENSIVE OPERATIONS (FM 3-0) ⁃ Surprise ⁃ Concentration ⁃ Audacity ⁃ Tempo 7. FORMS OF MANEUVER (FM 3.90) ⁃ Envelopment ⁃ Turning Movement ⁃ Infiltration ⁃ Penetration ⁃ Frontal Attack 8. TENETS OF BREACHING OPERATIONS (FM 3-21.10) ⁃ Intelligence ⁃ Breach Fundamentals ⁃ Breach Organization ⁃ Mass ⁃ Synchronization 9.…

    • 1046 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    References: Kim, D., & Solomon, M. G. (2012). Fundamentals of Information Systems SecuritY. Sudbury: Jones & Bartlett Learning.…

    • 651 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Kudler Security Report

    • 8349 Words
    • 34 Pages

    References: Whitman, M., & Mattord, H. (2010). Management of Information Security (3rd ed.). Retrieved from https://ecampus.phoenix.edu/content/eBookLibrary2/content/eReader.aspx?…

    • 8349 Words
    • 34 Pages
    Powerful Essays
  • Better Essays

    Cmgt 400 Week 2

    • 1100 Words
    • 3 Pages

    Whitman, M. E. (2011). Readings and Cases in Information Security: Law and Ethics. New York, NY: Cengage Learning.…

    • 1100 Words
    • 3 Pages
    Better Essays
  • Powerful Essays

    Before World War I, most U.S. intelligence activities were limited to espionage and relationships built with other countries. It was not until the declaration of war on Germany did the U.S. increase their intelligence capabilities. This paper will analyze how information superiority through intelligence could have affected the Battle of Argonne Forest. This will include how the introduction of signals intelligence (SIGINT) and aerial reconnaissance could have altered the outcome of the largest and bloodiest battle ever fought by American forces.…

    • 1221 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    A tendency that has potential to emerge is the ‘six-thousand-mile screwdriver’ where the longing for information and control has previously encouraged higher headquarters to stymie initiative and deny tactical leaders from capturing or regaining the initiative. When denied a common operating picture, operational level headquarters may attempt to “revert to hierarchy as a means of control.” When now retired General Stanley A. McChrystal commanded the Joint Special Operations Command in Iraq and Afghanistan in the mid-2000s, he understood the complexities and evolutionary nature of the violent extremist threat. Because of the enemy’s speed of adaptation, General McChrystal knew that his forces had to adapt equally fast. “In order to realize this intent, McChrystal did not merely devolve decision-making authority to subordinates who acted on their own initiative,” he created a “shared consciousness” which allowed subordinates to “understand and react to the interdependence of the battlefield.” The Army’s mission command philosophy will become increasingly decisive in future degraded or denied…

    • 1248 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    The Rookie Chief Iso

    • 3874 Words
    • 16 Pages

    The CISO is the executive responsible for the organization's entire security posture, both physical and digital. CISOs also frequently own or participate closely in related areas such as business continuity planning, loss prevention and fraud prevention, and privacy.…

    • 3874 Words
    • 16 Pages
    Powerful Essays
  • Better Essays

    Cmgt400 Week 3

    • 1752 Words
    • 8 Pages

    Whitman, M., & Mattord, H. (2010). Management of Information Security (third ed.). Pittsburgh, PA: Cengage Learning.…

    • 1752 Words
    • 8 Pages
    Better Essays
  • Better Essays

    Computer Crime

    • 1584 Words
    • 7 Pages

    This type of crime is the illegal exploitation of computer technologies, usually involving the Internet, to support crimes such as fraud, identity theft, sharing of information, and embezzlement.…

    • 1584 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    Electronic Warfare

    • 567 Words
    • 3 Pages

    Electronic Warfare (EW) has the fastest growth trend compared to any other military system and is one of the key elements of the modern battle scenario, protecting one’s own forces from attack, denying information to the enemy and intercepting and disrupting an enemy’s voice communication and data links. In effect, EW is a continuing war between active systems that ‘attack’ and defensive systems which ‘protect’. The basic concept of EW is to exploit the enemy’s electromagnetic emission in all parts of the electromagnetic spectrum.…

    • 567 Words
    • 3 Pages
    Satisfactory Essays