The Application of Non-quantitative Modelling in the Analysis of a Network Warfare Environment
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 32799
The Application of Non-quantitative Modelling in the Analysis of a Network Warfare Environment

Authors: N. Veerasamy, JPH Eloff

Abstract:

Network warfare is an emerging concept that focuses on the network and computer based forms through which information is attacked and defended. Various computer and network security concepts thus play a role in network warfare. Due the intricacy of the various interacting components, a model to better understand the complexity in a network warfare environment would be beneficial. Non-quantitative modeling is a useful method to better characterize the field due to the rich ideas that can be generated based on the use of secular associations, chronological origins, linked concepts, categorizations and context specifications. This paper proposes the use of non-quantitative methods through a morphological analysis to better explore and define the influential conditions in a network warfare environment.

Keywords: Morphological, non-quantitative, network warfare.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1070721

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1324

References:


[1] Zwicky, F. Discovery, "Invention, Research - Through the Morphological Approach", Toronto: The Macmillan Company, New York, 1969.
[2] Arquilla J & Rondfeldt D, "The Advent of Netwar", RAND, 1996.
[3] Harris, S," CISSP All-in-One Certification Guide", Mcgraw- Hill/Osborne, 2002.
[4] Zwicky, F. & Wilson A. (eds.), "New Methods of Thought and Procedure: Contributions to the Symposium on Methodologies", Berlin: Springer, 1967.
[5] Ritchey T, "Modelling Complex Socio-Technical Systems Using Morphological Analysis", Adapted from an address to the Swedish Parliamentary IT Commission, Stockholm, December 2002.
[6] The Free Dictionary, "Ontology", Available online from http://www.thefreedictionary.com/ontology, Accessed 14 march 2008.
[7] G J Stein, "Information Warfare", Airpower Journal, No 1, pp 30-39, Spring 1995.
[8] Ritchy T, "General Morphological Analysis", Adapted from the paper "Fritz Zwicky, Morphologie and Policy Analysis", presented at the 16th EURO Conference on Operational Analysis, Brussels, 1998.
[9] Wik MW, "Revolution in Information Affair", Available online from: http://www.kkrva.se/Links/Infokrig/Wik1.html, Accessed 13 February 2008.
[10] Elbirt AJ, "Information Warfare: Are you at risk? ", IEEE Technology and Society Magazine, 2003/2004.
[11] Bhalla N, "Is the Mouse Click Mighty Enough to Bring Society to its Knees", Computers & Security, vol. 22, issue 4, pp 322-336, May 2003.
[12] Sensepost Training Providers, "Hacking by Numbers: Cadet Edition", Adapted from the Cadet Training Edition course slides, November 2007.
[13] Panda B & Giordano J, "Defensive Information Warfare", Communications of the ACM, vol. 42 no. 7, pp 31-32, July 1999.