期刊文献+

网络电磁空间作战威胁分析 被引量:1

Analysis of Cyber Electromagnetic Space Warfare Threat
下载PDF
导出
摘要 提出了网电空间作战几个需要关注的问题以及解决方案,使得部队可以根据战场具体环境,进行适应性的应用。首先陈述了网电空间作战的特点,接着阐述了在网电空间中军队所要面临、应对的现实威胁。然后针对这些威胁进行了进一步分析,并且确定了战场环境下所需要的基础安全条件。最后从四个层面阐述了网电空间的脆弱性,同时给出了防御措施。该工作可以对确立可实施的网电空间战术以及有效地组织网电空间行动形成支撑。 A cyber warfare scenario is shown,which is applicable on the basis of modern battlefield situations.The scenario removes misconceptions about present cyber warfare properties and defines actual dangers that should be prepared for in the background of the cyberspace.The dangers are analyzed further and the basic security prerequisites are determined.Technologies are proposed that offer the basic necessary for achieving these prerequisites.An organization of cyberspace weaknesses and the correlative defenses in four levels is shown.Conclusions are drawn that demonstrate the manner in which cyber threats should be determined,their likelihood assessed and averted.This knowledge leads to the determination of implementable cyber tactics and effective organization of cyber operations.
作者 栾胜利
机构地区 北京西三环中路
出处 《舰船电子工程》 2014年第6期31-33,37,共4页 Ship Electronic Engineering
关键词 网电空间 网电空间作战 网电空间攻击 网电空间防御 cyberspace cyber warfare cyber attack cyber denfense
  • 相关文献

参考文献10

  • 1Clarke Richard A, Knake Robert. Cyber war: the next threat to national security and what to do about it[M]. NewYork: Harper Collins publisher,2010. 被引量:1
  • 2The White House. International strategy for cyber space-prosperity, security, and openness in a net- worked world[EB/OL. 1_2011-08-061. http..//www. whitehouse, gov/blog/2011/05 / 16/launching-us-inter national-strategy-cyberspace. 被引量:1
  • 3Department of Defense, USA. Department of Defense strategy for operating in cyberspace]-EB/OL. [2011 08- 061. http://www, defens gov/news/d20110714cyber. pdf. 被引量:1
  • 4Nandakishore Santhi, Guanhua Yan, Stephan Eiden benz. Cybersim: geographic, temporal, and organiza tional dynamics of malware propagation[C//Proceed ings of the 2010 Winter Simulation Conference, Balti more, United states, 2010. 被引量:1
  • 5LAWSON SEAN. Beyond Cyber-Doom: cyberattaek scenarios and the evidence of history ER. Alington: Meroatus Center at George Mason University,2011. 被引量:1
  • 6Kocher P. Timings attacks on implementations of Diffie Hellman, RSA, DSS and other systemsC//Crypto 1996. Berlin: Springer-Verlag, 1996 104-113. 被引量:1
  • 7Shamir A, Biham E. Differential fault analysis of secret key cryptosystems [ C]//Proceedings of Crypto'97, 1998. Berlin: Springer-Verlag. LNCS 1294,1998:513- 525. 被引量:1
  • 8Jun B, Kocher P, Jaffe J. Differential power analysis [C]//Crypto 1999. LNCS 1666,1999.. 338-397. 被引量:1
  • 9Sloan R H, Messerges T S, Dabbish t A. Investiga- tions of power analysis attacks on smart cards [C]// Proceedings of the USENIX Workshop on Smartcard Technology(WOST 1999). Berkeley.- USENIX Associ- ation Berkeley, 1999 .. 17-28. 被引量:1
  • 10N. G. Bardis, A. Drigas, A. P. Markovskyy, et al. Accelerated Modular Multiplication Algorithm of Large Word Length Numbers with a Fixed Module EC//Communications in Computer and Information Science 111, WSKS 2010 Corfu, Greece, September 2010 Proceedings, Part I , Berlin: Springer- Ver- lag, 2010 : 573-581. 被引量:1

同被引文献18

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部