StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Information Warfare and Security - Essay Example

Summary
The paper "Information Warfare and Security" is an outstanding example of an information technology essay. In regards to Dorothy E.Denning, (1998).In the past decades, information warfare was not a serious endeavor. On the contrary, the recent years have evidenced a continental shift as information warfare has elicited attention in various quarters…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.3% of users find it useful

Extract of sample "Information Warfare and Security"

Student’s Name Instructor’s Name Class Name Date Critical summary Information Warfare and Security In regards to Dorothy E.Denning, (1998).In the past decades, information warfare was not a serious endeavor. On the contrary, the recent years have evidenced a continental shift as information warfare has elicited attention in various quarters. Governments, security specialists, and serious onlookers are some of the perturbed parties by the upsurge of information warfare. Information warfare is a synonym that has multiple meaning. This article refers to the scenario where information terrorists using a normal personal computer hack into a system causing unwarranted harm or damage. Some of the recent escapades evidenced by humanity because of information warfare include plane crashes, unprecedented power blackouts, poisoning food supplied, and traffic accidents caused by traffic lights inconsistencies. In the past, information terrorists have tampered with banking systems and the stock market. They could have managed to collapse the stock exchanges making away with millions of dollars of inventors money. However, these events have not happened, but they are on the verge of occurring if nothing happens to reinforce the prevalent information security. Children in the modern day and age depict high-end intelligence and pose a dire threat to information security. This book provides an introductory approach to information warfare seeking to enhance security and safeguard attacks from adversaries. It is worth noting that there is a wide range of information warfare including: telecommunications eavesdropping, fraud, espionage, intelligence operations, computer break-ins, sabotage, electronic warfare, and perception management. Over the recent past, there has been an upsurge in the number of teenagers using the internet platform as a playground for hacking Dorothy E.Denning, (1998).These activities are extremely risky as the teenagers acquire information from government officials, lawyers, or military officers and spread the same through the virtual battlegrounds. The book provides salient objectives that would mitigate detrimental effects of information warfare. Additionally, the book provides theories that would integrate operations to a single comprehensive framework. This provides a clear picture of the threat emanating from information warfare. Coding In Cellular Communications The Bulgarian societies depict an increase in cellular communications. Specialists who mastermind these technologies are always on the spotlight given numerous questions that remain unanswered. This book focuses on information coding in second-generation cellular systems. The book has six chapters where the author sequentially outlines information coding endeavors. The first chapter illumines cellular communication systems considered by the author to be smart communication systems (Sofia, 2000).The main systems, modulation process, interrelationships and coding or decoding are highlighted in this chapter. The second and third chapters are concerned with the encoding or decoding activities of voices bearing both vector and instantaneous quantization. It is evident that the rate distortion theory dictates that better results are achievable by quantizing vectors as opposed to scalars. Additionally, the theory reaffirms that if signal samples are statistically dependent, that dependency is exploitable by jointly quantizing blocks of samples seeking to achieve better results compared to the scalar quantization. The fourth chapter confines itself to channel decoding or encoding of digitalized information. From the voice recorder, digital information has limited redundancy. The channel encoder seeks to prevent data streams from inherent limitations including noise and fading found in radio channels. It is evident that the cellular systems are characterized with limited power and link up the same approach to coding. Chapter 6 discusses the inherent limitations of coded modulations Sofia (2000).It is worth noting that the coding in cellular systems is useful to telecommunication, radio engineers, as well as postgraduate students working in the telecommunications and network systems. Network Security Fundamentals This book concentrates on equipping network administrators with an overview of the salient issues that would keep a computer network safe. In recent years, computer networks have become a prerequisite to the advancement of communication. This implies that numerous networks are exposed to hackers and other internet criminals. With networking antics taking an upward shift, the gadgets used to harness connectivity have also increased. Recent developments indicate that the internet is available than ever and its speed is enhanced. News and other information sources indicate that there are numerous reasons why networks should remain secure Peter Norton and Mike Stockman(2000).On the other hand, the contrabands or hackers are developing new methods to crack into network systems using bugs, mis-configured access privileges, flaws, Trojan horse programs, among other methods. The threat increases with the newly discovered security breaches usable by people with unlimited time on their computers even if they lack adequate skills. Research indicates that there is no watertight network system gadget be it a server, router, or operating system. The only solution to the prevalent problem is to configure a network system in a way that it will notify the user when cracked. Additionally, it is vital for network administrator to update themselves on the new network flaws and prompt fixes, which reduce the harm. Educating network users is an essential element that spearheads preventing the hacker’s antics. This is because of the fact that ill-informed users are swindled into providing crucial information facilitating hacker’s abilities. It is prudent to note that, without user education and cooperation amongst network users, any solution to network management does not offer lasting solutions. Finally, the book offers a number of ways to ensure network users are safe using the resources as opposed to restricting use (Peter Norton and Mike Stockman 2000). LAN Times Guide to Security and Data Integrity Modernization has resonated to innumerable changes affecting humanity in diverse ways. Computer networking has its fair of modernization, which has left many in the industry in awe of what to except in the foreseeable future. The critical question revolving the resent advancements revolves around data protection. While a majority of individuals views the internet as a source of information and an aid alleviating humanity’s standard of living, there is a sizeable section worried about data safety in the network. Internet is not the only network susceptible to data loss. It is evident that all network gadgets can permit data loss. Companies have shifted to using Local Area Network (LAN) seeking to support business functions. Though applicable in the short term, network administrators need to develop new technologies to secure data. Marc Farley, Tom, (1996).This book avails a conclusive approach to LAN administrators seeking to enhance their data protection antics. The book avails a multi-displinary approach implying that has a wide coverage of topics. The topics presented include data backup or recovery, hierarchical storage management, redundant systems, user security management, system security and policy authentication, encryption, and disaster recovery planning. The first two chapters seek to familiarize readers with the viable network protection mechanisms. The third chapter provides an in-depth insight of LAN backup and the foundation to data protection schemes. The fourth chapter intends to enlighten network administrators on ways to manage data growth through archiving and other techniques. The fifth chapter provides viable ways to minimize data redundancy seeking to protect LAN systems and data. Chapter six concludes on data base management while using LAN networks. Throughout the book, amicable ways to mitigate data loss are provided seeking to reinforce data security amid the heightened information warfare (Marc Farley, 1996). Bibliography Dorothy E.Denning, December 1998, Information warfare and Security Addison-Wesley Sofia, 2000, Edition in Bulgarian On the way to information Society . 348 pages, ISBN 954- 90121-6-6, Procon. Peter Norton and Mike Stockman (2000). Network Security Fundamentals SAMS. Marc Farley (1996). LAN Times to security and Data integrity Tom Stearns and Jeffrey Hsu, MacGraw-Hill, 0-7-882166-6. Read More
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us