Subversion as a Threat in Information Warfare

As adversaries develop Information Warfare capabilities, the threat of information system subversion presents a significant risk. System subversion will be defined and characterized as a warfare tool. Through recent security incidents, it is shown that means, motive, and opportunity exist for subver...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Journal of information warfare 2004-01, Vol.3 (2), p.51-64
Hauptverfasser: Anderson, Emory A., Irvine, Cynthia E., Schell, Roger R.
Format: Artikel
Sprache:eng
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 64
container_issue 2
container_start_page 51
container_title Journal of information warfare
container_volume 3
creator Anderson, Emory A.
Irvine, Cynthia E.
Schell, Roger R.
description As adversaries develop Information Warfare capabilities, the threat of information system subversion presents a significant risk. System subversion will be defined and characterized as a warfare tool. Through recent security incidents, it is shown that means, motive, and opportunity exist for subversion, that this threat is real, and that it represents a significant vulnerability. Mitigation of the subversion threat touches the most fundamental aspect of the security problem: proving the absence of a malicious artifice. A constructive system engineering technique to mitigate the subversion threat is identified.
format Article
fullrecord <record><control><sourceid>jstor</sourceid><recordid>TN_cdi_jstor_primary_26502785</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><jstor_id>26502785</jstor_id><sourcerecordid>26502785</sourcerecordid><originalsourceid>FETCH-jstor_primary_265027853</originalsourceid><addsrcrecordid>eNpjYuA0NDEx1TU2NjFngbMNjTgYeIuLswwMDAzNjQwsDIw4GXSDS5PKUouKM_PzFBKLFRIVQjKKUhNLFDLzFDzz0vKLchNLQFLhiUVpiUWpPAysaYk5xam8UJqbQdbNNcTZQzeruCS_KL6gKDM3sagy3sjM1MDI3MLUmJA8AGSALzU</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Subversion as a Threat in Information Warfare</title><source>JSTOR Archive Collection A-Z Listing</source><creator>Anderson, Emory A. ; Irvine, Cynthia E. ; Schell, Roger R.</creator><creatorcontrib>Anderson, Emory A. ; Irvine, Cynthia E. ; Schell, Roger R.</creatorcontrib><description>As adversaries develop Information Warfare capabilities, the threat of information system subversion presents a significant risk. System subversion will be defined and characterized as a warfare tool. Through recent security incidents, it is shown that means, motive, and opportunity exist for subversion, that this threat is real, and that it represents a significant vulnerability. Mitigation of the subversion threat touches the most fundamental aspect of the security problem: proving the absence of a malicious artifice. A constructive system engineering technique to mitigate the subversion threat is identified.</description><identifier>ISSN: 1445-3312</identifier><identifier>EISSN: 1445-3347</identifier><language>eng</language><publisher>School of Computer and Information Science, Edith Cowan University, Western Australia</publisher><ispartof>Journal of information warfare, 2004-01, Vol.3 (2), p.51-64</ispartof><rights>Copyright 2004</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://www.jstor.org/stable/pdf/26502785$$EPDF$$P50$$Gjstor$$H</linktopdf><linktohtml>$$Uhttps://www.jstor.org/stable/26502785$$EHTML$$P50$$Gjstor$$H</linktohtml><link.rule.ids>314,780,784,803,58017,58250</link.rule.ids></links><search><creatorcontrib>Anderson, Emory A.</creatorcontrib><creatorcontrib>Irvine, Cynthia E.</creatorcontrib><creatorcontrib>Schell, Roger R.</creatorcontrib><title>Subversion as a Threat in Information Warfare</title><title>Journal of information warfare</title><description>As adversaries develop Information Warfare capabilities, the threat of information system subversion presents a significant risk. System subversion will be defined and characterized as a warfare tool. Through recent security incidents, it is shown that means, motive, and opportunity exist for subversion, that this threat is real, and that it represents a significant vulnerability. Mitigation of the subversion threat touches the most fundamental aspect of the security problem: proving the absence of a malicious artifice. A constructive system engineering technique to mitigate the subversion threat is identified.</description><issn>1445-3312</issn><issn>1445-3347</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2004</creationdate><recordtype>article</recordtype><sourceid/><recordid>eNpjYuA0NDEx1TU2NjFngbMNjTgYeIuLswwMDAzNjQwsDIw4GXSDS5PKUouKM_PzFBKLFRIVQjKKUhNLFDLzFDzz0vKLchNLQFLhiUVpiUWpPAysaYk5xam8UJqbQdbNNcTZQzeruCS_KL6gKDM3sagy3sjM1MDI3MLUmJA8AGSALzU</recordid><startdate>20040101</startdate><enddate>20040101</enddate><creator>Anderson, Emory A.</creator><creator>Irvine, Cynthia E.</creator><creator>Schell, Roger R.</creator><general>School of Computer and Information Science, Edith Cowan University, Western Australia</general><scope/></search><sort><creationdate>20040101</creationdate><title>Subversion as a Threat in Information Warfare</title><author>Anderson, Emory A. ; Irvine, Cynthia E. ; Schell, Roger R.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-jstor_primary_265027853</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2004</creationdate><toplevel>online_resources</toplevel><creatorcontrib>Anderson, Emory A.</creatorcontrib><creatorcontrib>Irvine, Cynthia E.</creatorcontrib><creatorcontrib>Schell, Roger R.</creatorcontrib><jtitle>Journal of information warfare</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Anderson, Emory A.</au><au>Irvine, Cynthia E.</au><au>Schell, Roger R.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Subversion as a Threat in Information Warfare</atitle><jtitle>Journal of information warfare</jtitle><date>2004-01-01</date><risdate>2004</risdate><volume>3</volume><issue>2</issue><spage>51</spage><epage>64</epage><pages>51-64</pages><issn>1445-3312</issn><eissn>1445-3347</eissn><abstract>As adversaries develop Information Warfare capabilities, the threat of information system subversion presents a significant risk. System subversion will be defined and characterized as a warfare tool. Through recent security incidents, it is shown that means, motive, and opportunity exist for subversion, that this threat is real, and that it represents a significant vulnerability. Mitigation of the subversion threat touches the most fundamental aspect of the security problem: proving the absence of a malicious artifice. A constructive system engineering technique to mitigate the subversion threat is identified.</abstract><pub>School of Computer and Information Science, Edith Cowan University, Western Australia</pub></addata></record>
fulltext fulltext
identifier ISSN: 1445-3312
ispartof Journal of information warfare, 2004-01, Vol.3 (2), p.51-64
issn 1445-3312
1445-3347
language eng
recordid cdi_jstor_primary_26502785
source JSTOR Archive Collection A-Z Listing
title Subversion as a Threat in Information Warfare
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-07T12%3A56%3A18IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-jstor&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Subversion%20as%20a%20Threat%20in%20Information%20Warfare&rft.jtitle=Journal%20of%20information%20warfare&rft.au=Anderson,%20Emory%20A.&rft.date=2004-01-01&rft.volume=3&rft.issue=2&rft.spage=51&rft.epage=64&rft.pages=51-64&rft.issn=1445-3312&rft.eissn=1445-3347&rft_id=info:doi/&rft_dat=%3Cjstor%3E26502785%3C/jstor%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_jstor_id=26502785&rfr_iscdi=true