An information operation model and classification scheme

Document Type

Conference Proceeding

Publisher

chool of Computer and Information Science, Edith Cowan University

Place of Publication

Perth, Western Australia

Faculty

Faculty of Computing, Health and Science

School

School of Computing, Health and Science

RAS ID

4720

Comments

Shaw, D. T., & Cikara, S. (2006, December). An Information Operation Model and Classification Scheme. In proceedings of 7th Australian Information Warfare and Security Conference, Edith Cowan University, Perth Western Australia. Available here

Abstract

Information systems are used in overt and covert conflict and information operations target an opponent’s ability to manage information in support of operations for political, commercial and military advantage. System level attacks are complicated by logistic problems that require resources, command and control. Node level attacks are practical but of limited value. Collocated equipment comprises a temporary node that may be feasibly attacked. Estimation of IW operation merits may founder on the difficulty of predicting the net benefit for the costs. Starting from with Shannon’s model, a simple costbenefit model is discussed. Existing models are extended by an IW attack classification. A notional attack on system hardware is discussed with some defensive measures.

DOI

10.4225/75/57a815b8aa0d1

Access Rights

free_to_read

Share

 
COinS
 

Link to publisher version (DOI)

10.4225/75/57a815b8aa0d1