Integrating cooperative engagement capability into network-centric information system security

作者: Sr. Korzyk

DOI: 10.4018/978-1-93177-743-8.CH003

关键词: Information warfareLocale (computer hardware)Information securityInformation systemSoftware deploymentComputer securityInfantryData securityNetwork securityEngineering

摘要: The U.S. military's concept of a Cooperative Engagement Capability should serve as useful referent for those attempting to design/develop large scale, organization-wide information security systems. This involves centralizing command over the entire suite defensive assets (naval, air, ground) available in some region or locale; whenever threat is directed against any US force element (a ship, an infantry unit, etc.), this central authority would then be expected direct deployment whatever appears most efficient countermeasure...in light prospective well actual threats. dramatic departure from traditional decentralized approach, whereby each was draw on its own measures counter at it source. Industrial/commercial organizations might logic devising system secure informational assets.

参考文章(13)
Martin C. Libicki, What Is Information Warfare Strategic Forum. ,(1995) , 10.21236/ADA385640
John W. Sutherland, A prospective on macrocybernetic process management systems Technological Forecasting and Social Change. ,vol. 55, pp. 215- 248 ,(1997) , 10.1016/S0040-1625(97)00022-X
Matthew Stillerman, Carla Marceau, Maureen Stillman, Intrusion detection for distributed applications Communications of The ACM. ,vol. 42, pp. 62- 69 ,(1999) , 10.1145/306549.306577
Jim Waldo, The Jini architecture for network-centric computing Communications of The ACM. ,vol. 42, pp. 76- 82 ,(1999) , 10.1145/306549.306582
Deborah Frincke, Balancing cooperation and risk in intrusion detection ACM Transactions on Information and System Security. ,vol. 3, pp. 1- 29 ,(2000) , 10.1145/353323.353324
K.P. Birman, The next-generation Internet: unsafe at any speed? IEEE Computer. ,vol. 33, pp. 54- 60 ,(2000) , 10.1109/2.863968
Robert Durst, Terrence Champion, Brian Witten, Eric Miller, Luigi Spagnuolo, Testing and evaluating computer intrusion detection systems Communications of The ACM. ,vol. 42, pp. 53- 61 ,(1999) , 10.1145/306549.306571
Alvin Toffler, The Third Wave ,(1980)