01.12.2012 Views

Proceedings of the 11th European Conference on Information ...

Proceedings of the 11th European Conference on Information ...

Proceedings of the 11th European Conference on Information ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

capability to analyze <str<strong>on</strong>g>the</str<strong>on</strong>g> <strong>on</strong>line behaviour <str<strong>on</strong>g>of</str<strong>on</strong>g> users that affects <str<strong>on</strong>g>the</str<strong>on</strong>g> security<br />

<str<strong>on</strong>g>of</str<strong>on</strong>g> this envir<strong>on</strong>ment.<br />

Keyword: internet cafes, security awareness, security training, virtualized<br />

envir<strong>on</strong>ments, cyber literacy, internet<br />

Informati<strong>on</strong> Security Model to Military Organizati<strong>on</strong>s<br />

in Envir<strong>on</strong>ment <str<strong>on</strong>g>of</str<strong>on</strong>g> Informati<strong>on</strong> Warfare<br />

José Martins 1 , Henrique Santos 2 , Paulo Nunes 3 and Rui Silva 4<br />

1, 3<br />

Military Academy – CINAMIL, Lisboa, Portugal<br />

2<br />

University <str<strong>on</strong>g>of</str<strong>on</strong>g> Minho - Department <str<strong>on</strong>g>of</str<strong>on</strong>g> Informati<strong>on</strong> Systems, Guimarães,<br />

Portugal<br />

4<br />

Lab UbiNET/IPBeja, INESC-ID, Lisboa, Portugal<br />

Abstract: This article proposes a model to maximize <str<strong>on</strong>g>the</str<strong>on</strong>g> informati<strong>on</strong> security<br />

within military organizati<strong>on</strong>s, inserted in envir<strong>on</strong>ment <str<strong>on</strong>g>of</str<strong>on</strong>g> Informati<strong>on</strong><br />

Warfare. It attempts to answer three fundamental questi<strong>on</strong>s, what to do,<br />

why and how? to protect <str<strong>on</strong>g>the</str<strong>on</strong>g> informati<strong>on</strong> and Informati<strong>on</strong> Systems <str<strong>on</strong>g>of</str<strong>on</strong>g> possible<br />

incidents related to <str<strong>on</strong>g>the</str<strong>on</strong>g> informati<strong>on</strong> security that may affect c<strong>on</strong>fidentiality,<br />

integrity and availability <str<strong>on</strong>g>of</str<strong>on</strong>g> informati<strong>on</strong>. The main variables to<br />

be c<strong>on</strong>sidered are defined and <str<strong>on</strong>g>the</str<strong>on</strong>g>ir possible values are proposed. These<br />

variables are obtained by means <str<strong>on</strong>g>of</str<strong>on</strong>g> an interpretative epistemological approach,<br />

through a literature review, <str<strong>on</strong>g>the</str<strong>on</strong>g> use <str<strong>on</strong>g>of</str<strong>on</strong>g> research methods <str<strong>on</strong>g>of</str<strong>on</strong>g> C<strong>on</strong>tents<br />

Analysis, Focus Group and <str<strong>on</strong>g>the</str<strong>on</strong>g> General Morphologic Analysis method.<br />

To resp<strong>on</strong>d in an integrated manner to <str<strong>on</strong>g>the</str<strong>on</strong>g> three questi<strong>on</strong>s above, <str<strong>on</strong>g>the</str<strong>on</strong>g><br />

model c<strong>on</strong>siders <str<strong>on</strong>g>the</str<strong>on</strong>g> possible incidents <str<strong>on</strong>g>of</str<strong>on</strong>g> informati<strong>on</strong> security in Informati<strong>on</strong><br />

Systems, taking into account primarily <str<strong>on</strong>g>the</str<strong>on</strong>g> main comp<strong>on</strong>ents <str<strong>on</strong>g>of</str<strong>on</strong>g> <str<strong>on</strong>g>the</str<strong>on</strong>g><br />

security risks <str<strong>on</strong>g>of</str<strong>on</strong>g> Informati<strong>on</strong> Systems that collect, store, process, transmit<br />

and disseminate <str<strong>on</strong>g>the</str<strong>on</strong>g> informati<strong>on</strong>. Its operati<strong>on</strong> is guided by <str<strong>on</strong>g>the</str<strong>on</strong>g> military<br />

c<strong>on</strong>cepts <str<strong>on</strong>g>of</str<strong>on</strong>g> Informati<strong>on</strong> Warfare, Informati<strong>on</strong> Assurance, <str<strong>on</strong>g>the</str<strong>on</strong>g> most important<br />

principles <str<strong>on</strong>g>of</str<strong>on</strong>g> war applied to Defensive Operati<strong>on</strong>s and <str<strong>on</strong>g>the</str<strong>on</strong>g> military<br />

doctrine <str<strong>on</strong>g>of</str<strong>on</strong>g> Informati<strong>on</strong> Operati<strong>on</strong>s. Given <str<strong>on</strong>g>the</str<strong>on</strong>g> type <str<strong>on</strong>g>of</str<strong>on</strong>g> problem identified in<br />

<str<strong>on</strong>g>the</str<strong>on</strong>g> study, focusing primarily <strong>on</strong> <str<strong>on</strong>g>the</str<strong>on</strong>g> analysis <str<strong>on</strong>g>of</str<strong>on</strong>g> scenarios <str<strong>on</strong>g>of</str<strong>on</strong>g> informati<strong>on</strong><br />

security incidents and interc<strong>on</strong>necti<strong>on</strong> with <str<strong>on</strong>g>the</str<strong>on</strong>g> planning and selecti<strong>on</strong> <str<strong>on</strong>g>of</str<strong>on</strong>g><br />

security c<strong>on</strong>trols, <str<strong>on</strong>g>the</str<strong>on</strong>g> method used is <str<strong>on</strong>g>the</str<strong>on</strong>g> General Morphological Analysis.<br />

This method allows for <str<strong>on</strong>g>the</str<strong>on</strong>g> predicti<strong>on</strong> <str<strong>on</strong>g>of</str<strong>on</strong>g> possible scenarios <str<strong>on</strong>g>of</str<strong>on</strong>g> incidents<br />

related to informati<strong>on</strong> security at <str<strong>on</strong>g>the</str<strong>on</strong>g> organizati<strong>on</strong>al level, which results in<br />

21

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!