Dominating the attacker: Use of intelligence and counterintelligence in cyberwarfare
Document Type
Journal Article
Publisher
Mindsystems Pty. Ltd.
Faculty
Faculty of Computing, Health and Science
School
School of Computer and Information Science
RAS ID
342
Abstract
In the event of cyberwarfare the defender must harden the attacker’s target by secure design, a defined security perimeter, and a suite of tools. Indeed, the defender must be ever alert and ready to react to attack. Over many years, defenders in traditional warfare have learned to predict the style, magnitude and possible outcomes of a physical attack, and how to deceive and confuse an attacker with the objective of changing the outcome. Perhaps the cyberwarfare defender can take a similar approach, by employing intelligence and counterintelligence techniques that are superior to those of the attacker.
Comments
Davey, J., & Armstrong, H. (2002). Dominating the attacker: Use of intelligence and counterintelligence in cyberwarfare. Journal of Information Warfare, 2(1), 23-31. Available here