Information Technology Reference
In-Depth Information
create a lot of new cybertargets from backbones to broadband access networks that will
be used in military-oriented networks with a dynamic topology (like the MIPMANET
and ad hoc networks). It is necessary to provide worldwide communications among
geographically distributed troops.
Simultaneously the concept of convergence of PSTN and PSDN will create
possibilities for new information sources.
The Shannon's channel model offers us an understanding of any channels as
transformation of signals from a source to a receiver by means of coding and decoding,
which act in conditions of an ineradicable noise. Obviously, we can apply this model not
only to communication but to any objects of an information infrastructure.
The reference model OSI ISO demonstrates a spectrum of cybertargets, dividing the
channel from a physical layer up to a layer of application. Indeed, the modern
information sources are databases and bases of knowledge, which can be reached in
cyberspace only in conditions of uniform identification by both sources, and components
of them. The basic requirement of such identification is a provision of effective
searching of information in cyberspace not by man only, but above all, by intellectual
agents. Such uniform identification can be guaranteed only by means of standardization
of metadata, information warehouses and information objects, which also become
additional cybertargets.
That is why we can now extend the classification 13 by additional reasoning:
x Limited cyberwar acts within a layer of application and a presentation layer of
enemy information infrastructure (medium, target and weapon), and uses the
CND IO against information resources by means of violation of confidentiality,
authentication, and integrity
x Cyberwar as an adjunct to military operations is responsible for information
superiority in cyberspace (IIW), and acts within a session layer, a transport layer
and network layer of enemy information infrastructure, and uses the CND-CNO
IO against channels by corruption of an access control and non-repudiation
entities involved in a communication; cyberwar as an adjunct to military
operations can only be justified between parties in a period from 'crisis' to
'conflict'
x Unrestricted cyberwar uses the CNO IO and military operations for destroying
channels and corrupting signals; as there are no distinctions between an
unrestricted cyberwar and an armed warfare, they are therefore synonyms without
doubt
One small picture is better than a thousand words, and we would like to use this advice
for the demonstration of a small 'picture' of a possible big cyberwar onto a business-
oriented battlefield.
The modern business systems work in the Internet with four kinds of information
areas; standard data of standard tasks (SCM, CRM, DB, KB), well structured but non-
standard information areas, badly-structured and unstructured information areas.
Many systems are used for obtaining data from these diverse areas; content-analysis
systems, filtering systems, OLAP and data mining systems, and all these information
resources and systems are potential cybertargets (see Fig. 6).
Search WWH ::




Custom Search