War of 2050: a Battle for Information, Communications, and Computer Security
نویسندگان
چکیده
Hopefully there will be no war in 2050 or at any time in the future. But if the past is prologue, humankind’s warlike history compels a nation to think about and prepare for the challenges posed by a future conflict. To the extent we can predict, the bets are that the remarkable surge of information technologies of the last few decades will continue, even accelerate. Included in this set of technologies is the wide range of information-related and -enabled capabilities that are involved in obtaining, collecting, organizing, fusing, storing, and distributing relevant information as well as the capabilities associated with command and control (C2) functions and processes including reasoning, inference, planning, decision making, and collaborating (between humans, and between humans and machines). Finally, this term includes the capabilities that could be used to deny, deceive, disrupt, degrade, and compromise adversary information and information-related processes (e.g., cyber and electronic warfare). By the year 2050 these technologies, and the capabilities they offer, will transform the battlefield as we know it.
منابع مشابه
Users as the Biggest Threats to Security of Health Information Systems
There are a lot of researches in the world about attacks on information systems (IS). Although there have been many attempts to classify threats of IS’s especially in Health Information Systems (HIS), it is still necessary for all health organization to identify new threats and their sources which threaten security of health care domain. The main aim of this paper is to present a research agend...
متن کاملA Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications
Smart grid concept is introduced to modify the power grid by utilizing new information and communication technology. Smart grid needs live power consumption monitoring to provide required services and for this issue, bi-directional communication is essential. Security and privacy are the most important requirements that should be provided in the communication. Because of the complex design of s...
متن کاملIdentifying and Ranking Technology-Telecommunications Context of Information Security anagement System in E-Government Using Fuzzy AHP Approach
In recent years, many security threats have entered into the organizations’ information and changed the organizational performance resulting in their exorbitant costs. This question is of particular importanceabout government agencies that use information and Internet systems. This issue enabled the top managers of organizations to implement a security system and minimize these costs. Using In...
متن کاملMillitary Psychotherapy and Psychological Wounds of War
SUMMARY After a short reference to Iran-Iraq war as a motivating factor for the present study, the issues of battle stress and psychological wounds of war ar discuused. Reactions of the world armies 10 psychological breakdown of soldiers, military psychotherapy, therapy in combat zone and its developmental process through Civil war, Crimean war, first and Second world wars, Korean and Vietnam ...
متن کاملAn Overview of Group Key Management Issues in IEEE 802.16e Networks
The computer industry has defined the IEEE 802.16 family of standards that will enable mobile devices to access a broadband network as an alternative to digital subscriber line technology. As the mobile devices join and leave a network, security measures must be taken to ensure the safety of the network against unauthorized usage by encryption and group key management. IEEE 802.16e uses Multica...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- CoRR
دوره abs/1512.00360 شماره
صفحات -
تاریخ انتشار 2015