11.07.2015 Views

Encyclopedia of Computer Science and Technology

Encyclopedia of Computer Science and Technology

Encyclopedia of Computer Science and Technology

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

242 information warfareShannon found that if as long as the actual data transmissionrate is less than the channel capacity C, an errorcorrectingcode can be devised to ensure that any desiredaccuracy rate is achieved (see error correction). A relatedformula can also be used to find the lowest transmissionpower needed given a specified amount <strong>of</strong> noise.The influence <strong>of</strong> Shannon <strong>and</strong> his disciples on computinghas been pervasive. Information theory provides thefundamental underst<strong>and</strong>ing needed for applications in datacompression, signal analysis, data communication, <strong>and</strong>cryptography—as well as problems in other fields such asthe analysis <strong>of</strong> genetic mutation or variation.Further ReadingCover, Thomas, <strong>and</strong> Joy A. Thomas. Elements <strong>of</strong> Information Theory.2nd ed. Hoboken, N.J.: Wiley, 2006.Gray, R. M. Entropy <strong>and</strong> Information Theory. New York: Springer,1990. Available online. URL: http://ee.stanford.edu/~gray/it.pdf. Accessed August 8, 2007.Hankerson, Darrel, Greg A. Harris, Jr., <strong>and</strong> Peter D. Johnson. Introductionto Information Theory <strong>and</strong> Data Compression. 2nd ed.Boca Raton, Fla.: CRC Press/Chapman & Hall, 2003.IEEE Information Theory Society. Available online. URL: http://www.itsoc.org/. Accessed August 8, 2007.Shannon, Claude. “A Mathematical Theory <strong>of</strong> Communication.”Bell System Technical Journal 27 (July, October 1948): 379–423, 523–656. Available online. URL: http://plan9.bell-labs.com/cm/ms/what/shannonday/shannon1948.pdf. AccessedAugust 8, 2007.information warfareInformation warfare has many aspects <strong>and</strong> can be foughton many levels. On the battlefield, it can involve collectingtactical or strategic intelligence <strong>and</strong> protecting one’s ownchannels <strong>of</strong> communication. Conversely, it can involve disruptingthe enemy’s means <strong>of</strong> communication, blocking theenemy’s intelligence gathering, spreading disinformation,<strong>and</strong> trying to disrupt their decision process. Beyond thebattlefield, media (including the Internet) can be used forpropag<strong>and</strong>a purposes.All <strong>of</strong> these objectives today involve the use <strong>of</strong> digitalinformation <strong>and</strong> communications systems. Examples include:• analysis <strong>of</strong> enemy communications using both automatictools <strong>and</strong> human analysts• cryptography <strong>and</strong> signal analysis• protection <strong>of</strong> computer <strong>and</strong> network infrastructure• attacks <strong>and</strong> disruptions on enemy information infrastructure,both military <strong>and</strong> civilian (such as denial<strong>of</strong>-serviceattacks on Web sites)• use <strong>of</strong> Web sites to spread disinformation or propag<strong>and</strong>aHistory <strong>and</strong> DevelopmentInformation warfare is as old as warfare itself, with suchthings as ruses designed to trick or confuse enemy sentriesor lighting many fires to convince the enemy that one’sarmy was much larger than in reality. Wiretapping <strong>and</strong>spo<strong>of</strong> messages began with the telegraph in the mid-19thcentury, <strong>and</strong> eavesdropping <strong>and</strong> other tricks with radiowere used in World War I. These arts had greatly increasedin scale <strong>and</strong> sophistication by World War II—an entire fakearmy corps was “created” to deceive the Germans prior tothe D-day invasion.Information warfare involving computers has been usedin recent conflicts. The active phase <strong>of</strong> the U.S. attack in thefirst Gulf War in 1991 began with systematic destruction<strong>and</strong> disruption <strong>of</strong> Iraqi information <strong>and</strong> comm<strong>and</strong>-<strong>and</strong>-controlassets through targeted attacks. As a result, the stilllargely intact Iraqi military was left blind as to the comingflank attack by U.S. forces.In 2007 a series <strong>of</strong> coordinated attacks by unknownparties paralyzed much <strong>of</strong> Estonia’s Web-based government<strong>and</strong> business structures following a dispute with Russia.To many observers this represents a model for “strategic”information warfare that might be used in future conflicts.(Note that the techniques used in information warfare bythe national military <strong>and</strong> the kinds <strong>of</strong> cyber attacks thatmight be favored by terrorists overlap. For the latter, seecyberterrorism.)Further ReadingArmistead, E. Leigh. Information Warfare: Separating Hype fromReality. Washington, D.C.: Potomac Books, 2007.Greenmeier, Larry. “Estonian ‘Cyber Riot’ Was Planned, but MastermindStill a Mystery.” InformationWeek, August 3, 2007.Available online. URL: http://www.informationweek.com/showArticle.jhtml?articleID=201202784. Accessed September23, 2007.Johnson, L. Scott. “Toward a Functional Model <strong>of</strong> InformationWarfare.” Available online. URL: http://bss.sfsu.edu/fischer/IR%20360/Readings/Information%20War.htm. Accessed September23, 2007.Libicki, Martin C. Conquest in Cyberspace: National Security <strong>and</strong>Information Warfare. New York: Cambridge University Press,2007.Rattray, Gregory J. Strategic Warfare in Cyberspace. Cambridge,Mass.: MIT Press, 2001.Waltz, Edward. Information Warfare: Principles <strong>and</strong> Operations.Boston: Artech House, 1998.Input/Output (I/O)While the heart <strong>of</strong> a computer is its central processing unitor CPU (the part that actually “computes”), a computermust also have a “circulatory system” through which datamoves between the CPU, the main memory, input devices(such as a keyboard or mouse), output devices (such as aprinter), <strong>and</strong> mass storage devices (such as a hard or floppydisk drive). Input/Output or I/O processing is the generalterm for the management <strong>of</strong> this data flow (see also bus,parallel port, serial port, <strong>and</strong> usb).I/O processing can be categorized according to how arequest for data is initiated, what component controls theprocess, <strong>and</strong> how the data flows between devices. In mostearly computers the CPU was responsible for all I/O activities(see cpu). Under program control, the CPU initiated adata transfer, checked the status <strong>of</strong> the device (or area <strong>of</strong>memory) that would be sending or receiving the data, <strong>and</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!