Paper
1 October 2001 From war to computer war: military forces, computer intelligence, and computer assault
Author Affiliations +
Proceedings Volume 4566, Internet-based Enterprise Integration and Management; (2001) https://doi.org/10.1117/12.443141
Event: Intelligent Systems and Advanced Manufacturing, 2001, Boston, MA, United States
Abstract
As everyone, and every firm, the armed forces are using more and more electronic information, and all the means that can be used to carry this information. This is not something new, but more and more systems, and overall, decision making process are relying on whether the right information is delivered to the right place, on the right time, or not. These are the very classical three questions: 1. Is the 'integrity' of information ensured? 2. Is the information always 'available?' 3. Is the information kept 'confidential?' If you can answer yes to those three questions, you are supposed to be in a 'secured' electronic environment. The way and the means to answer 'yes' to the above questions are gathered in the 'computer systems security - CSS.' However, as soon as your are working with networks, CSS becomes very difficult to fulfill. This is not acceptable as soon as we are processing military information. Furthermore, and still from a military point of view, CSS is suffering from its static nature, and from the fact that it is only a bunch of defensive protocols, methods and process, when military action is mainly offensive.
© (2001) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Roger F. Cozien "From war to computer war: military forces, computer intelligence, and computer assault", Proc. SPIE 4566, Internet-based Enterprise Integration and Management, (1 October 2001); https://doi.org/10.1117/12.443141
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Computer networks

Internet

Warfare

Computer security

Computing systems

Defense and security

Military intelligence

RELATED CONTENT

Research on enterprise network security system
Proceedings of SPIE (May 06 2022)
Analysis of the possibilities of using IPSec on a Linux...
Proceedings of SPIE (October 01 2018)
Considerations and foundations for Botnet simulation
Proceedings of SPIE (April 13 2009)
Data exfiltration and covert channels
Proceedings of SPIE (May 10 2006)
Bot armies as threats to network security
Proceedings of SPIE (April 09 2007)

Back to Top