Information Warfare

Posted By on December 30, 2014


Download PDF
List of Information Security Threats
IPv6 Security Threats
Information Warfare in its broadest sense is a struggle over the information and communications process, a struggle that began with the advent of human communication and conflict. Over the past few decades, the rapid rise in information and communication technologies and their increasing prevalence in our society has revolutionized the communications process and with it the significance and implications of information warfare. Information warfare is the application of destructive force on a large scale against information assets and systems, against the computers and networks that support the four critical infrastructures (the power grid, communications, financial, and transportation). However, protecting against computer intrusion even on a smaller scale is in the national security interests of the country and is important in the current discussion about information warfare.

Offensive Information Warfare

Information warfare is a veritable option for the U.S. to employ to advance its foreign policy interests. As the pre-eminent information society, the United States possesses the technological knowledge to wage an effective information war. Though information warfare falls under the auspices of the DoD, some information warfare techniques could be employed by the IC in executing covert action operations.

Defensive Information Warfare

The DoD and the IC have done a commendable job in identifying and adjusting to the new national security threat posed by information warfare. However, there is still work to be done. Thus the following is recommended: (1)National Institute of Standards and Technology (NIST) with the assistance of the National Security Agency (NSA) and Defense Information Systems Agency (DISA) should set computer security standards and objectives for the private sector; (2)a joint and powerful commission with representatives from law enforcement, industry, and the scientific community, as well as ranking members of Congress, should review the current policy on encryption and the political impasse that surrounds it; (3)the DoD must lessen its dependence on the National Information Infrastructure (NII) or develop a secure, emergency form of communication in the event of an information warfare attack; (4)the NII threat assessment should be prepared in a declassified format to be released to the public; (5)and there should be continued coordination, namely Dual Use Technology, between the government and industry.

List of Information Security Threats
IPv6 Security Threats

Download PDF

Posted by Akash Kurup

Founder and C.E.O, World4Engineers Educationist and Entrepreneur by passion. Orator and blogger by hobby

Website: http://world4engineers.com