Network Security Operations

Tracing Based Active Intrusion Response

ABSTRACT

Network-based intrusion has become a serious threat to today’s highly networked information systems, existing intrusion defense approaches such as intrusion prevention, detection, tolerance and response are “passive” in response to network-based intrusions in that their countermeasures are limited to being local to the intrusion target and there is no automated, network-wide counteraction against detected intrusions. While they all play an important role in counteracting network-based intrusion, they do not, however, effectively address the root cause of the problem – intruders.

NATO’s Security Operations in Electronic Warfare: The Policy of Cyber Defence and the Alliance’s New Strategic Concept

ABSTRACT

The North Atlantic Treaty Organisation (NATO) is evolving, both militarily and politically. In April of 2009, Allied member-states agreed to a renewed Strategic Concept to be presented in 2010. There will be a requirement of technological update against any forms of asymmetrical threats that includes electronic attacks. NATO is steadily unfolding a policy of Cyber- Defence. This paper provides the reader with the appropriate information, on what has been accomplished up to this date, in relation to NATO's network operational preparations. It examines and evaluates existing policies and recommends new ones to counter 21st century electronic warfare attacks.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Keywords

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

  • Journal of Information Warfare
    114 Ballard Street
    Yorktown, VA
    23690
  • 757.234.6664
  • jiw@gbpts.com