Information Warfare: Corporate Attack and Defence in a Digital WorldThis text introduces the concepts of information warfare from a non-military, organizational perspective. It is designed to stimulate managers to develop policies, strategies, and tactics for the aggressive use and defence of their data and knowledge base. The book covers the full gambit of information warfare subjects from the direct attack on computer systems to the more subtle psychological technique of perception management. It provides the framework needed to build management strategies in this area. The topics covered include the basics of information warfare, corporate intelligence systems, the use of deception, security of systems, modes of attack, a methodology to develop defensive measures, plus specific issues associated with information warfare. This book will be of interest to executives and managers in any public or private organization. Specifically, managers or staff in the areas of information technology, security, knowledge management, public relations, or marketing should find it directly useful. Its main purpose is to make readers aware of the new world of information saturation; thus decreasing the chance that they will become victims of those abusing the information age, whilst at the same time increasing their chances of benefiting from the new opportunities produced. |
Contents
1 I Concepts in information warfare | 1 |
2 I Information as an intelligence weapon | 21 |
4 I Sources of threat for IT systems | 61 |
5 I Attacks and retaliation | 73 |
6 Attack and defence | 83 |
7 An lWar risk analysis model | 97 |
8 Implications of lWar for information managers | 103 |
9 I The legal perspective of IWar | 113 |
Appendix 1 Checklist for an information attack | 157 |
Appendix 2 Using the Viable System Model as a framework for an attack | 161 |
Appendix 3 I Checklist for deception | 169 |
Appendix 4 Retaliation against information attack attitudes and practices of information systems managers | 173 |
Discussion questions | 189 |
Useful web sites | 195 |
Glossary of terms | 197 |
201 | |
Other editions - View all
Common terms and phrases
action activities Australia behaviour Bill Hutchinson chapter Communicator Help Back competitors computer network computer security computer systems concept context corporate create cyber terrorist Cyberwar damage deception defensive denial-of-service attacks disruption Edit View Go effective electronic encryption ensure environment example Exhibit external Go Communicator Help hackers hacking Hezbollah human I-War impact Inbox-Netscape individuals information attack information manager information systems information warfare infrastructure integrity intelligence function international law Internet Internet Explorer knowledge Kosovo manipulate McLibel ment Microsoft Microsoft PowerPoint monitor National Information Infrastructure Netscape on-line operations organisation perception potential Print Security problem produce protect Reload Home Search response retaliation risk analysis model S1 units Sinn Fein staff strategies tactics target terrorist/resistance groups threat tion treaties Viable System Model View Go Communicator virus vulnerable Whilst Zapatista