Share Email Print

Proceedings Paper

From war to computer war: military forces, computer intelligence, and computer assault
Author(s): Roger F. Cozien
Format Member Price Non-Member Price
PDF $17.00 $21.00

Paper Abstract

As everyone, and every firm, the armed forces are using more and more electronic information, and all the means that can be used to carry this information. This is not something new, but more and more systems, and overall, decision making process are relying on whether the right information is delivered to the right place, on the right time, or not. These are the very classical three questions: 1. Is the 'integrity' of information ensured? 2. Is the information always 'available?' 3. Is the information kept 'confidential?' If you can answer yes to those three questions, you are supposed to be in a 'secured' electronic environment. The way and the means to answer 'yes' to the above questions are gathered in the 'computer systems security - CSS.' However, as soon as your are working with networks, CSS becomes very difficult to fulfill. This is not acceptable as soon as we are processing military information. Furthermore, and still from a military point of view, CSS is suffering from its static nature, and from the fact that it is only a bunch of defensive protocols, methods and process, when military action is mainly offensive.

Paper Details

Date Published: 1 October 2001
PDF: 7 pages
Proc. SPIE 4566, Internet-based Enterprise Integration and Management, (1 October 2001); doi: 10.1117/12.443141
Show Author Affiliations
Roger F. Cozien, Ministere de la Defense (France)

Published in SPIE Proceedings Vol. 4566:
Internet-based Enterprise Integration and Management
Angappa Gunasekaran; Yahaya Y. Yusuf, Editor(s)

© SPIE. Terms of Use
Back to Top
Sign in to read the full article
Create a free SPIE account to get access to
premium articles and original research
Forgot your username?