Cyberwar-Netwar :Security in the Information Age ( NATO Security through Science Series - D: Information and Communication Security )

Publication subTitle :Security in the Information Age

Publication series : NATO Security through Science Series - D: Information and Communication Security

Author: Carvalho F.D.;Mateus da Silva E.  

Publisher: Ios Press‎

Publication year: 2006

E-ISBN: 9781607501718

P-ISBN(Paperback): 9781586036126

Subject: C0 Social Science Theory and Methodology

Keyword: 社会科学理论与方法论

Language: ENG

Access to resources Favorite

Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.

Description

Today the Internet is entering a new stage which will have a much stronger impact on the daily lives of all kinds of organizations. The next communication paradigm offers an improved access to mobility information, offering people and all organizations that deal with mobile devices the ability to access information whenever and wherever necessary. We really are at the edge of a new technological revolution, based on the ubiquity of information through the use of mobile devices and telecommunications. Furthermore, historical tendencies lead us to believe that the impact both on people and on organizations of this technological wave will be both faster and more powerful than any previous one. To the individual, information ubiquity results in the necessity to have immediate access to information. The strategic tactic and operational impact in organizations will therefore be incomparably deeper than in previous organizational management change using technology such as total quality management or business process re-engineering. This book acknowledges that it is crucial to find new organisational security approaches in the context of increasing dependency on the new technological wave which is building an information, communication and knowledge society.

Chapter

Discussion of Chapter 1

Chapter 2. The Quest for Simplicity in Security: Digital Signatures Made Simple

Discussion of Chapter 2

Chapter 3. Cyber-Terrorism - How Much of a Threat Is It?

Discussion of Part I

Part II. Operational Security of Ubiquitous Information

Chapter 4. Securing Networks in the Information Age

Discussion of Chapter 4

Chapter 5. Operational Security of Ubiquitous Information

Discussion of Chapter 5

Discussion of Part II

Part III. Strategic Knowledge: How Intelligence and Security Tools Can Help

Chapter 6. From Data to Knowledge: How Intelligence and Security Tools Can Help

Discussion of Chapter 6

Chapter 7. Methodology of Protecting the State Information Resources in Information and Telecommunication Systems in Ukraine

Discussion of Chapter 7

Discussion of Part III

Chapter 8. Conclusions of the Workshop

Final Report of the Workshop

Subject Index