22.01.2015 Views

Military Communications and Information Technology: A Trusted ...

Military Communications and Information Technology: A Trusted ...

Military Communications and Information Technology: A Trusted ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 4: <strong>Information</strong> Assurance & Cyber Defence<br />

421<br />

implement this kind of activities. It results in lack of one, unified classification,<br />

because different authors use different criteria of cyber terrorist attack description.<br />

Applying the above mentioned Ockham’s razor rule, the following classification,<br />

according to CERT Pol<strong>and</strong> (Computer Emergency Response Team), is proposed<br />

(in alphabetical order):<br />

• attack on email subsystem,<br />

• attack on operational system,<br />

• attack on a server (for e.g.: WWW, DNS – Domain Name System),<br />

• illegal software,<br />

• denial of service,<br />

• dissemination of illegal <strong>and</strong> insulting, abusive content,<br />

• scanning,<br />

• social engineering,<br />

• spamming.<br />

It can also be h<strong>and</strong>ful to differentiate attacks <strong>and</strong> intrusions following categories:<br />

• reconnaissance activities before an attack (intrusion)<br />

• passwords cracking methods<br />

• exploiting vulnerabilities <strong>and</strong> security holes (using characteristics of applications,<br />

operating systems <strong>and</strong> protocols)<br />

• malicious code attacks (Trojans, viruses, worms) [4].<br />

V. Methodology of collecting information about cyber incidents<br />

A. Characteristic of data sources <strong>and</strong> registration process<br />

Among variety of events identified during military missions some can be<br />

registered <strong>and</strong> observed by human senses (soldiers’ <strong>and</strong> civilians’ participating<br />

in mission) <strong>and</strong> some other only by means technical devices (Figure 2).<br />

Considering the scope of the ATHENA project <strong>and</strong> the characteristics of typical<br />

military mission, which are among all:<br />

• occurrence of asymmetric threats,<br />

• occurrence of sudden events,<br />

• time deficit,<br />

• incomplete <strong>and</strong> unsure information,<br />

• high pressure for completion of the tasks assigned <strong>and</strong> the overall goal<br />

achievement,<br />

it is difficult to perform a comprehensive (<strong>and</strong> complete) observations by soldiers<br />

<strong>and</strong> civilians (e.g. the main sources of information about incidents) in the timeframe<br />

of a mission. As a result a factual data about incidents is usually limited <strong>and</strong><br />

fragmentary. Thus some auxiliary sources of information should be considered:<br />

• correctly constructed models – simulation environments, (e.g. simulation<br />

models, war games, battlefield simulators)

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!