Is software warfare “unthinkable”? or is there a rational basis for its adoption?

Author:

Leighninger Eric V.

Abstract

We in the information security community have lost our claim to innocence. We have known sin. For years, we have been viewing ourselves as crusading defenders of the faith, guardians of a mythical "cyberspace" community against the infidels of computing, those who would penetrate, vandalize, and exploit the systems of innocent users. We have painted the security technology we have been developing as good and the intrusive methods developed by the "hackers", "phreaks", and computer terrorists as bad. The labels appeared clear - we, the computer security folks, wore the white hats and the other guys, the black. However, in much the same way that knowledge of computer security flaws aided the penetrators of systems, so our knowledge of malicious software methods has contributed to our ability to build more robust, resilient, intrusion-resistant systems. Where we differ from the bad guys, we think, is in application and motive for use. But times are changing. The spectre of computer warfare, the dark twin to INFOSEC, has arisen. The computer security technology that we selectively considered as benignly good has a darker side which is becoming more apparent, as happened to the technologies for nuclear energy and biochemistry. If history has been any teacher, computer technology, security related or otherwise, will be no exception. We now have a two-edged Sword of Damocles at our disposal. It, like its nuclear and biochemical warfare cousins, is poised to hang over our heads. We need to heed Santayana's advice: "Those who cannot remember the past are condemned to repeat it." and not ignore history in examining early on the threats software warfare may pose now and in the distant future.

Publisher

Association for Computing Machinery (ACM)

Reference17 articles.

1. Abolins J. Computer "Warfare" RISKS DIGEST 10.74 RISKS-FORUM Digest ACM Committee on Computers and Public Policy Peter Neumann moderator. Abolins J. Computer "Warfare" RISKS DIGEST 10.74 RISKS-FORUM Digest ACM Committee on Computers and Public Policy Peter Neumann moderator.

2. "Army Scouting to Enlist Aid of Computer Virus" Washington Post pg C1 Wednesday 23 May 1990. "Army Scouting to Enlist Aid of Computer Virus" Washington Post pg C1 Wednesday 23 May 1990.

3. Department of the Army Broad Area Announcement CECOM Center for Signals Warfare 25 January 1991. Department of the Army Broad Area Announcement CECOM Center for Signals Warfare 25 January 1991.

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3