首页> 外文会议>Conference on Internet-Based Enterprise Integration and Management Oct 31-Nov 1, 2001, Newton, USA >From War to Computer War: military forces, computer intelligence and computer assault
【24h】

From War to Computer War: military forces, computer intelligence and computer assault

机译:从战争到计算机战争:军队,计算机情报和计算机攻击

获取原文
获取原文并翻译 | 示例

摘要

As everyone, and every firm, the armed forces are using more and more electronic information, and all the means that can be used to carry this information. This is not something new, but more and more systems, and overall, decision making process are relying on whether the right information is delivered to the right place, on the right time, or not. These are the very classical three questions: 1. Is the "integrity" of information ensured? 2. Is the information always "available"? 3. Is the information kept "confidential"? If you can answer yes to those three questions, you are supposed to be in a "secured" electronic environment. The way and the means to answer "yes" to the above questions are gathered in the "computer systems security - CSS". However, as soon as your are working with networks, CSS becomes very difficult to fulfill. This is not acceptable as soon as we are processing military information. Furthermore, and still from a military point of view, CSS is suffering from its static nature, and from the fact that it is only a bunch of defensive protocols, methods and process, when military action is mainly offensive.
机译:作为每个人和每个公司,武装部队正在使用越来越多的电子信息,以及可以用来传送该信息的所有手段。这不是什么新鲜事物,而是越来越多的系统,总的来说,决策过程取决于是否在正确的时间,正确的时间将正确的信息传递到正确的地方。这是非常经典的三个问题:1.是否确保信息的“完整性”? 2.信息是否总是“可用”? 3.信息是否保持“机密”?如果您对这三个问题的回答是“是”,那么您应该处于“安全的”电子环境中。在“计算机系统安全性-CSS”中收集了回答上述问题的“是”的方式和方法。但是,一旦您使用网络,CSS就很难实现。我们正在处理军事情报后,这是不能接受的。此外,从军事角度来看,CSS仍受其静态性质的困扰,并且在军事行动主要是进攻性的情况下,CSS只是一堆防御协议,方法和过程。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号