Critical National Infrastructure

Denial of Service and Protection of Critical Infrastructure

ABSTRACT

Denial of service attacks generate massive volumes of illegitimate traffic and utilize system resources in a way that renders the system inoperable, thus denying access to authorised personnel. Denial of service attacks can be projected against systems controlling critical information infrastructure and have the potential to be an effective weapon in cyberwarfare. This paper explains the concept of a denial of service attack, discusses the different methods of achieving denial of service and looks at the impact this type of attack may have on critical infrastructure. Although there are no fail-safe ways to protect against denial of service attacks, several means of minimising damage to information systems are discussed.

Critical Infrastructures and the Human Target in Information Operations

ABSTRACT

When people speak of “targeting” in the context of Information Operations and Information Warfare, many tend to make direct analogies to kinetic warfare: Attacks on Critical Infrastructure, attacks on command - and - control centres and capabilities, attacks on computers and information systems, etc. Interest in attacking Critical Infrastructures comes easily and readily to mind, as it is generally a legacy of the sort of strategic bombing envisioned by the earliest airpower advocates and developed to a relatively high art during and since the Second World War.

Protecting the National Critical Infrastructure: The Human Dimension From a Government Perspective

ABSTRACT

The history of mankind has been punctuated by events of a seminal nature: those events which have had a profound and lasting impact upon the development of human society. The discovery of fire, the introduction of the wheel, the use of speech and writing to communicate complex ideas are all examples of those events, possibly almost trivial in themselves, which have moulded the human race. We take them for granted, along with the knowledge gleaned by Homo Sapiens collectively over the last 100,000 years. We can only guess, however, at the social upheaval and cultural havoc wrought by each of these changes as they were adopted into human society.

Protecting Sensitive Law Enforcement Agencies' Data: Data Security in the Cloud

ABSTRACT

The possibility of accessing information related to an investigation at any time and from any place is getting increasingly important for security forces, especially the police. Thus, needs arise to store this information in a cloud, to protect these data from unauthorized access, and to allow access to only authorized persons—often only within a limited time period. The conceptual paper at hand describes a technique to store data in a cloud in a secure encrypted manner and grant the access rights adapted to current requirements.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Keywords

A

AI
APT

C

C2
C2S
CDX
CIA
CIP
CPS

D

DNS
DoD
DoS

I

IA
ICS

M

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

Registered Agent and Mailing Address

  • Journal of Information Warfare
  •  ArmisteadTEC
  • Dr Leigh Armistead, President
  • 1624 Wakefield Drive
  • Virginia Beach, VA 23455

 757.510.4574

 JIW@ArmisteadTec.com