Information warfare: are you at risk?
نویسنده
چکیده
The construction of the Global Information Infrastructure (GII) has been facilitated by the technological advancement of the microprocessor in the areas of speed, performance, power consumption, and cost. The GII is expected to create a global computer network for use in personal, organizational, and governmental communications. The population of technologically advanced countries such as the United States has grown heavily dependent on the communication networks provided by the GII. As a result of this dependence, the associated technology and information systems become targets for Information Warfare attacks [1]. As stated in a United States Department of Defense report published in 1993 [2]:
منابع مشابه
Survey on Urban Warfare Augmented Reality
Urban warfare has become one of the main forms of modern combat in the twenty-first century. The main reason why urban warfare results in hundreds of casualties is that the situational information of the combatant is insufficient. Accessing information via an Augmented Reality system can elevate combatants’ situational awareness to effectively improve the efficiency of decision-making and reduc...
متن کاملBiological warfare and bioterrorism: a historical review.
By reading, you can know the knowledge and things more, not only about what you get from people to people. Book will be more trusted. As this biological warfare and bioterrorism a historical review, it will really give you the good idea to be successful. It is not only for you to be success in certain life you can be successful in everything. The success can be started by knowing the basic know...
متن کاملIntroduction to Modern EW Systems. Edited by Andrea De Martino, Artech House, 2012; 417 pages. Price: £119.00, ISBN 978-1-60807-207-1
Master the latest electronic warfare (EW) techniques and technologies related to on-board military platforms with this authoritative resource. You gain expert design guidance on technologies and equipment used to detect and identify emitter threats, giving you an advantage in the never-ending chess game between sensor guided weapons and EW systems. This unique book offers you deeper insight int...
متن کاملInside Cyber Warfare - Mapping the Cyber Underworld
No wonder you activities are, reading will be always needed. It is not only to fulfil the duties that you need to finish in deadline time. Reading will encourage your mind and thoughts. Of course, reading will greatly develop your experiences about everything. Reading inside cyber warfare mapping the cyber underworld is also a way as one of the collective books that gives many advantages. The a...
متن کاملP35: How to Manage Anxiety
Anxiety is a mental state that is elicited in anticipation of threat or potential threat. Sensations of anxiety are a normal part of human experience, but excessive or inappropriate anxiety can become an illness. Anxiety is part of the normal human experience. We may speculate that it served human survival during evolution by enhancing preparedness and alertness. However, anxious manifestations...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IEEE Technol. Soc. Mag.
دوره 22 شماره
صفحات -
تاریخ انتشار 2003