Kids Library Home

Welcome to the Kids' Library!

Search for books, movies, music, magazines, and more.

     
Available items only
E-Book/E-Doc
Author Brand, John H, II, author.

Title A proposed modeling protocol for evaluating information attacks / John H. Brand II.

Publication Info. Aberdeen Proving Ground, MD : Army Research Laboratory, January 1999.

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  D 101.133/2:112    ---  Available
Description 1 online resource (vi, 28 pages) : illustrations
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
Series ARL-TN ; 112
ARL-TN ; 112.
Type Of Report Final; January-November 1997
Note Title from title screen (viewed on Nov. 23, 2015).
Bibliography Includes bibliographical references (page 23).
Access APPROVED FOR PUBLIC RELEASE.
Summary The essence of an information attack is to alter, either by intrusion into and manipulation of a database or by deception, the scenario under which a target mind or organization evaluates and selects future courses of action. The aim is to influence the actions of the target. The method is alteration of the perceived desirability or expected payoff of specific courses of action. This alteration of the information in possession of the target can be described as alteration of the perceived reality under which the target operates. Probable success by an attacker in altering the target's perceived behavior, given a successful manipulation of the target's information, has, in the past, been subjective. A modeling protocol based on the use of game theory is proposed that may, in certain cases, allow optimization of the scenario, or reality, imposed on the target to force the choice of a desired course of action. It should also allow a quantitative estimate of the likelihood of the target's adopting a given course of action. This tool can be used to estimate friendly susceptibility to information attack.
Funding 2182040 6U-6U01 P611102.B48 *TEP10 BFTA0 S18129
Subject Hacking -- Mathematical models.
Information warfare -- Mathematical models.
Computer security -- Mathematical models.
Linear programming.
Game theory.
Information warfare.
Data bases.
Scenarios.
Optimization.
Data processing security.
Army planning.
Intrusion.
Computer Systems Management and Standards.
Indexed Term PE61102A
Added Author U.S. Army Research Laboratory, issuing body.
Other Form: Print version: Proposed modeling protocol for evaluating information attacks (OCoLC)45516659
Standard No. DTICE ADA362101
Gpo Item No. 0324-A-03 (online)
Sudoc No. D 101.133/2:112

 
    
Available items only