The Journal of
Information Warfare

A primary subscription resource for professionals with an interest in Information Warfare. Access the latest thinking in Information Operations from the military, government, industry and educational perspective.

LATEST EDITION SUBSCRIPTIONS

Information Operations and Cyber Warfare

The aim of the Journal is to provide a definitive publication that makes available the latest thinking and research in the critical area of information warfare, information operations, cyber crime and cyber warfare. It is published four times a year in traditional hard copy and in electronic format via this web site. The first full publication occurred in September 2001. It is the intention that this journal will present the very best and latest thinking in the information warfare and information operations arena.

 

 

  • Volume 13, Issue 2 Editorial

    To all readers, we are very excited about this issue. This is a special edition of the Journal of Information Warfare (JIW) and the first of its kind where we have collaborated with the Information Assurance Directorate (IAD) of the National Security Agency (NSA). In this publication, we bring you 10 articles from current and highly technical subject matter experts ...

    Read Abstract
  • Using Classified Intelligence to Defend Unclassified Networks

    Abstract: Intelligence services, such as the National Security Agency, have access to unique information about adversarial cyber-exploitation and -attack capabilities. Nations such as the United States should be employing this unique but sensitive information in the defense of national security, government, critical infrastructure, and other networks, but doing so may expose the sources and methods behind the intelligence. Once exposed, ...

    Read Abstract
  • Outmaneuvering Cyber Adversaries Using Commercial Technologies

    Abstract: NSA characterizes assurance as having confidence that United States Government (USG) missions and networks can withstand attacks from determined adversaries. By Presidential Directive Order, the Director of the National Security Agency (DIRNSA) is the authority for National Security Systems (NSS), and this authority is delegated to the Information Assurance Directorate (IAD) to determine standards and policies for the nation’s ...

    Read Abstract
  • How IAD Leverages Big Data for Anomaly and Malware Detection (v10.2)

    Abstract: Malware is growing increasingly sophisticated. Threats are becoming more targeted and moving to places where existing defenses have limited visibility. Proactively addressing these threats means leveraging insights gained from Big Data and the fusion of multiple sources of information. Operational Fusion and Analysis, OFA, an organization within the National Security Agency’s Information Assurance Directorate utilizes Big Data to provide ...

    Read Abstract
  • Securing the Cloud

    Abstract: This paper will review cloud technology utilized to support the Intelligence Community and will specifically address the National Security Agency’s research into vulnerabilities and risks related to cloud-based systems. Current implementation plans will be discussed for a multi- agency private cloud architecture that is under development. The paper will also review security challenges for a cloud architecture and will ...

    Read Abstract
  • Active Cyber Defense: A Vision for Real-Time Cyber Defense

    Abstract: Cyber operations consist of many functions spanning cyber management, cyber attack, cyber exploitation, and cyber defense, all including activities that are proactive, defensive, and regenerative in nature. A subset of cyber defense, Active Cyber Defense (ACD) focuses on the integration and automation of many services and mechanisms to execute response actions in cyber-relevant time. ACD is comprised of a ...

    Read Abstract
  • Cyber-Mugging: Summary and Analysis of a Simulated ICS/SCADA Attack

    Abstract: In a representative Industrial Control System (ICS)/Supervisory Control And Data Acquisition (SCADA) laboratory environment, a simulated cyber attack suggests that an attacker with a low to moderate level of technical proficiency may utilize common, publicly-available tools and techniques to obtain complete control of the ICS environment. The cyber-physical relationship between information systems and industrial machinery has created environments where ...

    Read Abstract
  • Information Assurance Standards: A Cornerstone for Cyber Defense

    Abstract: NSA has a rich history of contributing to standards that enable cyber defense. This paper examines that history, tracing the evolution of NSA’s involvement in the development of early commercial encryption standards, through its more public contributions to network security protocols, to its current efforts to promote and create cyber standards that support the Department of Defense’s use of ...

    Read Abstract
  • Achieving Confidence in Cyberspace in an Ever-Changing Ecosystem

    Abstract: The Information Assurance Directorate (IAD) of the National Security Agency is charged with developing security solutions that protect and defend National Security Systems. This cannot be accomplished by NSA alone. Partnerships with industry, academia, U.S. and foreign government entities are critical to delivering solutions that will meet and defeat cyber challenges of today and tomorrow. A comprehensive approach and ...

    Read Abstract
  • Volume 13, Issue 1 Editorial

    I would like to wish all of our readers a Happy New Year. This is my fourth issue as the new Chief Editor of the Journal of Information Warfare, which gives me a chance to look back over the last 12 months to reflect on what we have done … and more importantly to think about where we want to ...

    Read Abstract

 

The Journal of Information Warfare is a primary, and rapidly expanding, source of cyber security research, thinking and insight.

Read the Latest Editorial or Subscribe to JIW