Subversion as a Threat in Information Warfare
Anderson, Emory A.
Irvine, Cynthia E.
Schell, Roger R.
MetadataShow full item record
As adversaries develop Information Warfare capabilities, the threat of information system subversion presents a significant risk. System subversion will be defined and characterized as a warfare tool. Through recent security incidents, it is shown that means, motive, and opportunity exist for subversion, that this threat is real, and that it represents a significant vulnerability. Mitigation of the subversion threat touches the most fundamental aspect of the security problem: proving the absence of a malicious artifice. A constructive system engineering technique to mitigate the subversion threat is identified.
Showing items related by title, author, creator and subject.
Rogers, David T. (Monterey, California. Naval Postgraduate School, 2003-06);The subversion technique of attacking an operating system is often overlooked in information security. Operating Systems are vulnerable throughout their lifecycle in that small artifices can be inserted into an operating ...
Lack, Lindsey A. (Monterey, California. Naval Postgraduate School, 2003-06);The attack of choice for a professional attacker is system subversion: the insertion of a trap door that allows the attacker to bypass an operating system's protection controls. This attack provides significant capabilities ...
Subversion as a Facet of Terrorism and Insurgency The Case for a Twenty-First Century Approach; Strategic Insights: v.8, issue 3 (August 2009) Clutterbuck, Lindsay; Rosenau, William (Monterey, California. Naval Postgraduate School, 2009-08);For most analysts (to the extent they consider the subject at all), subversion as a threat essentially evaporated with the close of the Cold War. A notable exception is David Kilcullen, a leading counterinsurgency strategist, ...