| < Day Day Up > |
|
All individuals, organizations, or systems, most of which are outside the control of the military or national command authorities, that collect, process, and disseminate information to national and international audiences.
Visitors sign-in to your Web site, leaving a message to let you know what they thought of your site.
The label “hacker” has come to connote a person who deliberately accesses and exploits computer and information systems to which he or she has no authorized access. Originally, the term was an accolade for someone highly motivated to explore what computers could do and/or the limits of his or her technical skills (especially in programming). “A great hack” was a common compliment for an especially cunning or innovative piece of software code. The term “cracker” was then reserved for people intruding into computer or information systems for the thrill of it (or worse). Over time, “cracker” faded from usage and “hacker” came to subsume its (unfortunate) connotations.
A small electromagnetic device inside a drive that reads, writes, and erases data on the drive’s media.
A term (typically applied in combination with another) to connote action to usurp activity or interactions in progress. Most commonly used for those tactics that allow an intruder to usurp an authorized user’s session for his or her own ends.
(Internet Browser)—Stores the internet addresses (URLs) of the Web sites you have visited.
A mass of metal attached to a chip carrier or socket for the purpose of dissipating heat.
A term (attributed to “Air Force planners”) describing the notion that “war is becoming unimaginably and unmanageably fast.
Acronym for infrastructural and information warfare.
I/O stands for input/output. I/O is the communication between a computer and its user, its storage devices, other computers (via a network), or the outside world. The I/O port is the logical channel or channel endpoint in an I/O communication system.
Acronym for indications and warnings. This is a sort of catch-all label for any and all data signifying an operant or potential threat. Typically, “indications and warnings” connotes a summarization or fusion of raw data into a synopsis of current threat condition(s) (a report from an intel unit).
Acronym for “indications and warnings or threat assessment.”.This label is occasionally used to connote the summarization of incoming data with respect to threat conditions (extant or predicted).
Acronym for information-based warfare. Acronym for intelligence-based warfare.
Stands for integrated drive electronics. Describes a hard disk with the disk controller integrated within it. See also EIDE.
Acronym for intrusion-detection system.
Acronym for information-dominance warfare.
Acronym for intelligence and electronic warfare.
Those intelligence activities intended to detect and report time-sensitive intelligence information on foreign developments that could involve a threat to the United States or allied military, political, or economic interests or to U.S. citizens abroad. It includes forewarning of enemy actions or intentions; the imminence of hostilities; insurgency; nuclear or non-nuclear attack on the United States, its overseas forces, or allied nations; hostile reactions to U.S. reconnaissance activities; terrorists’ attacks; and other similar events.
Changing the adversary’s information by creating phenomena that the adversary must then observe and analyze.
The term for the class or character of war or warfare exemplified from the 18th century through to the present. Synonymous with second-wave war(fare).
Facts, data, or instructions in any medium or form. The meaning that a human assigns to data by means of the known conventions used in their representation. In intelligence usage, unevaluated material of every description that may be used in the production of intelligence.
A label generally used to connote the present or prospective era in which information technology (IT) is the dominant technical artifacture. The future time period when social, cultural, and economic patterns will reflect the decentralized, nonhierarchical flow of information; contrast this to the more centralized, hierarchical, social, cultural, and economic patterns that reflect the Industrial Age’s mechanization of production systems.
That subset of war-making that uses information technology as a tool to impart combat operations with unprecedented economies of time and force. This is exemplified by a cruise missile on precision force projection.
Directly corrupting information without visibly changing the physical entity within which it resides. In the wake of an information attack, an information function is indistinguishable from its original state except through inspecting its data or instructions.
Synonym for information warfare. An approach to armed conflict focusing on managing and using information in all its forms and at all levels to achieve a decisive military advantage, especially in the joint and combined environment.
That aspect of IW activities concerned with the acquisition of data. An organization needs a variety of information to support its operations. Information collection includes the entry points for information into an organization from both internal and external sources. Issues include quantity (completeness), quality (accuracy), and timelines of this information. Business examples of collection systems include point-of-sale (POS) systems, market surveys, government statistics, and internal management data. Military examples of collection systems include tactical radars and other sensors.
That class or type of IW threat that involves a competitor gaining access to an organization’s proprietary data.
Measures beyond normal protection to specifically target an adversary’s collection systems. There are two types of denial: direct attacks on the adversary’s information systems, and providing misinformation to its systems to deceive and induce the adversary to take actions that are not to its advantage. For the military, direct attacks include electronic warfare (jamming) of sensors and radio links. Besides direct attacks, there are safer ways to corrupt an adversary’s databases. These rely on providing false information to the targeted competitor’s collection systems to induce this organization to make bad decisions based on this faulty information.
That class or type of IW threat to one’s data assets that involves the loss of these data (or loss of access to these data) as the result of a hostile attack by an adversary.
In warfare, an operational advantage obtained through superior effectiveness of informational activity (acquisition and processing of data, information, and/or knowledge), to the extent that this advantage is demonstrated in practice through superior effectiveness of instrumental activity.
The subcategory of information warfare (IW) aimed at leveraging data, information, and knowledge to tactical and strategic advantage, as opposed to leveraging the media, channels, and vehicles of information transfer and/or processing. The goal of IDW is to achieve information dominance.
Any activity involving the acquisition, transmission, storage, or transformation of information.
A term that has come to be used to denote the application of information (and information processing or technology) in the context of military operations (conventionally delineated), as opposed to that connotation accorded IW to the effect that information and information systems are the substance, the tools, and the targets in an emerging warform.
The term “information operations” is typically encountered in IW discussions as a label for those concrete tasks and activities by which one pursues one’s own interests in the information realm. As such, information operations (or “info ops”) most commonly denotes specific paths of action, in contrast to IW denoting the broader sphere within which these actions are undertaken.
Synonym for information operations.
A (seemingly ungrammatical) synonym for information protection, quite frequently used in the U.S. military IW literature.
Information protection addresses two types of threats: information compromise and destruction. Compromise involves a competitor gaining access to an organization’s proprietary data. Destruction involves the loss of these data (or loss of access to these data) as the result of a hostile attack by an adversary
A commonly used term to denote the virtual space of data networks, contents, and commerce.
The protection of unauthorized access to or modification of information, whether in storage, processing, or transit, and against the denial of service to authorized users or the provision of service to unauthorized users, including those measures necessary to detect, document, and counter such threats.
That degree of dominance in the information domain, which permits the conduct of operations without effective opposition. Information Superiority combines the capabilities of intelligence, surveillance, reconnaissance (ISR) and command, control, communications, computers, and intelligence (C4I) to acquire and assimilate information needed to effectively employ our own forces to dominate and neutralize adversary forces. It includes the capability for near-real-time awareness of the location and activity of friendly, adversary, and neutral forces throughout the battlespace; and a seamless, robust C4I network linking all friendly forces that provides common awareness of the current situation.
The entire infrastructure, organization, personnel, and components that collect, process, store, transmit, display, disseminate, and act on information.
A synonym for INFOSEC. Protection of information systems against unauthorized access to or modification of information, whether in storage, processing, or transit and against the denial of service to authorized users.
The subcategory of information warfare (IW) aimed at leveraging media, channels, and vehicles of information transfer and/or processing to tactical and strategic advantage.
An ill-defined term (as yet) invoked to connote cyberspace mischief undertaken with intentions or ramifications analogous to the fear-inducing physical attacks one associates with terrorist activity.
That element of IW activities that involves moving data from points of collection to points of storage or use. The speed with which this is done affects the timelines of the data availability and, therefore, the responsiveness of the organization to situations. Transport considerations must be viewed within the overall information warfare perspective, because the same efficiency that facilitates rapid message and data transportation may also be used by a competitor to download proprietary databases in seconds or minutes.
Activities intertwined with, and superimposed on, other military operations, exploiting data and information in support of traditional military tasks such as command-and-control.
The broad class of activities aimed at leveraging data, information, and knowledge in support of military goals. Subcategories of information warfare can be differentiated into two general classes: (a) those aimed at leveraging the vehicles of information transfer or processing (information systems warfare— ISW); and (b) those aimed at leveraging the informative content or effect of such systems.
Stands for interrupt request. IRQ is the name of the hardware interrupt signals that PC peripherals (such as serial or parallel ports) use to get the processor’s attention. Because interrupts usually cannot be shared, devices are assigned unique IRQ addresses that enable them to communicate with the processor. Peripherals that use interrupts include LAN adapters, sound boards, scanner interfaces, and SCSI adapters.
| < Day Day Up > |
|