Information Warfare Principles and Operations

Λεπτομέρειες βιβλιογραφικής εγγραφής
Κύριος συγγραφέας: WALTZ, EDWARD (Συγγραφέας)
Μορφή: Βιβλίο
Γλώσσα:Greek
Έκδοση: Boston Artech House c1998
Θέματα:
Πίνακας περιεχομένων:
  • Preface 1. Concepts of Information in Warfare 1.1 Information's Role in Walfare 1.2 An Information Model of Warfare 1.3 The Transformations of Warfare 1.4 The Forms of Information Warfare 1.5 Defining Information Warfare and Information Operations 1.5.1 A Functional Taxonomy of Information Warfare 1.5.2 A Taxonomy of Military Operations for Information Warfare 1.6 Expanse of the Information Warfare Battlespace 1.7 The U.S. Transition to Information Warfare 1.8 Information Warfare and the Military Disciplines 1.9 Information and Peace 1.10 The Current State of Information Warfare 1.10.1 State of the Military Art 1.10.2 State of Operational Implementation 1.10.3 State of Relevant Information Warfare Technology 1.11 Summary Endnotes Part I Information - Based Warfare 2. The Role of Information Science in Warfare 2.1 The Meaning of Information 2.2 Information Science 2.2.1 Philosophy (Epistemology) 2.2.2 Philosophy (Logic) 2.2.3 Information (Logic) 2.2.4 Decision Theory 2.2.5 Semiotic Theory 2.2.6 Knowledge Management 2.3 Comparison of Approaches 2.4 Measuring the Utility of Information in Warface 2.5 Translating Science to Technology Endnotes 3. The Role of Technology in Information - Based Warfare 3.1 Knowledge - Creation Processes 3.2 Knowledge Detection and Discovery 3.3 Knowledge Creation in the OODA Loop 3.4 Deductive Data Fusion 3.5 Abductive - Inductive Data Mining 3.6 Integrating Information Technologies 3.7 Summary Endnotes 4. Achieving Information Superiority Through Dominant Battlespace Awareness and Knowledge 4.1 Principles of Information Superiority 4.1.1 Intelligence, Surveillance, and Reconnaissance(ISR) 4.2 Battlespace Information Architecture 4.3 Summary Endnotes Part II Information Operations for Information Warfare 5. Information Warfare Policy, Strategy, and Operations 5.1 Information Warface Policy, Strategy 5.2 An Operational Model of Information Warfare 5.3 Defensive Operations 5.4 Offensive Operations 5.5 Implementing Information Warfare Policy and Stratergy Endnotes 6. The Elements of Information Operations 6.1 The Targets of information Operations 6.1.1 The Global Information Infrastructure (GII) 6.1.2 The National Information Infrastructure (NII) 6.1.3 Defense Information Infrastructure (DII) 6.2 Information Infrastructure War Forms 6.3 Information Operations for Network Warfare 6.3.1 A Representative netwar Scenario 6.3.2 Taxonomy of Netwar Elements and Supporting Disciplines 6.4 Information Operations for Command and Cantrol Warfare(C2W) 6.4.1 A Representative C2W Scenario 6.4.2 Taxonomy of C2W Functional Elements and Supporting Disciplines 6.5 The Component Disciplines of Information Operations 6.5.1 Psychological Operations (PSYOPS) 6.5.2 Operational Deception 6.5.3 Electronic Operations 6.5.4 Physical Destruction 6.5.5 Intelligence 6.5.6 Counterintelligence 6.5.7 Information Security (INFOSEC) 6.5.8 Operational Security (OPSEC) 6.6 Summary Endnotes 7. An Operational Concept (CONOPS) for Information Operations Endnotes 8. Offensive Information Operations 8.1 Fundamental Elements of Information Attack 8.2 The Weapons of Information Warfare 8.3 Network Attack Tactics 8.3.1 Network Attack Vulnerabilities and Categories 8.3.2 Network Attack Processes 8.3.3 Internet Service Attacks 8.4 Command and Control Warfare Attack Tacties 8.4.1 Command and Control Network Vulnerabilities 8.4.2 Attack Categories for Data Fusion Systems 8.4.3 Attack Matrix for C41 Data Fusion 8.5 IW Targeting and Weaponeering Considerations 8.6 Information - Level (Network) Attack Techniques 8.6.1 Intelligence and Targeting 8.6.2 Weapon Delivery 8.6.3 Information weapons 8.7 Physical - Level Attack Techniques 8.7.1 Kinetic Energy Weapons 8.7.2 Chemical and Biological weapons (CBW) 8.7.3 Directed Energy Weapons (DEW) 8.7.4 Passive Conductive Measures 8.8 Offensive Operations Analysis, Simulation, and War Gaming 8.9 Summary Endnotes 9. Defensive Information Operations 9.1 Fundamental Elements of Information Assurance 9.2 Principles of Trusted Computing and Networking 9.3 Authentication and Access Control 9.3.1 Secure Authentication and Access Control Functions 9.3.2 Secure Access Systems: Firewalls 9.4 Cryptographic Encryption Measures 9.4.1 Ancryption Alternatives 9.4.2 Digital Signatures 9.4.3 Key Management 9.5 Incident Detection and Response 9.6 Survivable Information Structures 9.7 Defense Tools and Services 9.8 Physical - level System Security 9.9 Security Analysis and Simulation for Defensive Operations 9.10 Summary Endnotes 10. The Technologies of information Warfare 10.1 A Technology Assessment 10.2 Information Dominance Technologies 10.2.1 Collection Technologies 10.2.2 Processing Technologies 10.2.3 Dissemination and Presentation Technologies 10.3 Offensive Technologies 10.4 Defensive Technologies 10.5 Summary Endnotes About the Author Index