Cyber Warfare/Motivations
The search for information superiority is not new. Sun Tzu 's observation to "Know the enemy and know yourself; in a hundred battles you will never be in peril" is well-known and timelessly accurate. Scouting the enemy in order to gain advantage from knowing his dispositions (and simultaneously protecting against his scouts) is likewise ancient. Intuitively, this task is also the essence of practicality. In this age, old quest for knowledge of the enemy, history abounds with examples of commanders who either gained or lost the race for information superiority to decisive effect. We must first discuss what is new about the quest for information superiority that makes it different and relevant for today 's war fighters. The difference is in the character of the dawning 'information age. '
A new age is upon us. In this new age, information flows like water. In some form it is everywhere, and like water, it is essential. Information as a concept is old, but how we manipulate, transfer, collate, store, and use it is changing with the force of a tidal wave. Information as water has become a raging torrent. This change is revolutionary in impact and scope. Modern times are transitioning to what is being hailed as 'The Information Age. ' information warfare is how wars will be won in the future and that the key to operational success by military forces in information war is in the strategy and target set known as Command and Control Warfare. The information age posts information war and a fundamental shift in how wars will be waged in the future. In the course of analyzing how military forces gain information superiority, the idea that all military information invariably follows a path from 'sensor to decision-maker to shooter ' is developed. This "military information path" idea illuminates the specific fundamental changes and corresponding impacts on warfare in the information age. From these 'changes and impacts '
References: Easttom, C., "Computer Security Fundamentals (2nd Edition)" (2011)., New York, Pearson Press, Krutz, Ronald L.; Russell Dean Vines (2003). The Information Security Systems Prep Guide (Gold Edition ed.). Indianapolis, IN: Wiley. Layton, Timothy P. (2007). Information Security: Design, Implementation, Measurement, and Compliance. Boca Raton, FL: Auerbach publications. Anderson, K.,(2006)., "IT Security Professionals Must Evolve for Changing Market", SC Magazine, October 12, 2006. McNab, Chris (2004). Network Security Assessment. Sebastopol, CA: O 'Reilly Peltier, Thomas R. (2001). Information Security Risk Analysis. Boca Raton, FL: Auerbach publications. Aceituno, V., (2005), "On Information Security Paradigms",.,Woecester,Chicago, Manpack press. Dhillon, G., (2007), "Principles of Information Systems Security: text and cases", John Wiley & Sons. Depart of Homeland Security’s Role in Critical Infrastructure Protection Retrieved from http://www.us-cert.gov/control_systems/csthreats.html