Cyberdeterrence and Cyberwar / Martin C

Total Page:16

File Type:pdf, Size:1020Kb

Cyberdeterrence and Cyberwar / Martin C THE ARTS This PDF document was made available CHILD POLICY from www.rand.org as a public service of CIVIL JUSTICE the RAND Corporation. EDUCATION ENERGY AND ENVIRONMENT Jump down to document6 HEALTH AND HEALTH CARE INTERNATIONAL AFFAIRS The RAND Corporation is a nonprofit NATIONAL SECURITY research organization providing POPULATION AND AGING PUBLIC SAFETY objective analysis and effective SCIENCE AND TECHNOLOGY solutions that address the challenges SUBSTANCE ABUSE facing the public and private sectors TERRORISM AND HOMELAND SECURITY around the world. TRANSPORTATION AND INFRASTRUCTURE Support RAND WORKFORCE AND WORKPLACE Purchase this document Browse Books & Publications Make a charitable contribution For More Information Visit RAND at www.rand.org Explore RAND Project AIR FORCE View document details Limited Electronic Distribution Rights This document and trademark(s) contained herein are protected by law as indicated in a notice appearing later in this work. This electronic representation of RAND intellectual property is provided for non-commercial use only. Unauthorized posting of RAND PDFs to a non-RAND Web site is prohibited. RAND PDFs are protected under copyright law. Permission is required from RAND to reproduce, or reuse in another form, any of our research documents for commercial use. For information on reprint and linking permissions, please see RAND Permissions. This product is part of the RAND Corporation monograph series. RAND monographs present major research findings that address the challenges facing the public and private sectors. All RAND mono- graphs undergo rigorous peer review to ensure high standards for research quality and objectivity. CYBERDETERRENCE AND CYBERWAR MARTIN C. LIBICKI Prepared for the United States Air Force Approved for public release; distribution unlimited PROJECT AIR FORCE The research described in this report was sponsored by the United States Air Force under Contract FA7014-06-C-0001. Further information may be obtained from the Strategic Planning Division, Directorate of Plans, Hq USAF. Library of Congress Cataloging-in-Publication Data Libicki, Martin C. Cyberdeterrence and cyberwar / Martin C. Libicki. p. cm. Includes bibliographical references. ISBN 978-0-8330-4734-2 (pbk. : alk. paper) 1. Information warfare—United States. 2. Cyberterrorism—United States— Prevention. 3. Cyberspace—Security measures. 4. Computer networks—Security measures—United States. 5. Civil defense—United States. I. Title. U163.L539 2009 355.3'43—dc22 2009030055 The RAND Corporation is a nonprofit research organization providing objective analysis and effective solutions that address the challenges facing the public and private sectors around the world. RAND’s publications do not necessarily reflect the opinions of its research clients and sponsors. R® is a registered trademark. Cover design by Carol Earnest. Associated Press photo with overlay. © Copyright 2009 RAND Corporation Permission is given to duplicate this document for personal use only, as long as it is unaltered and complete. Copies may not be duplicated for commercial purposes. Unauthorized posting of RAND documents to a non-RAND Web site is prohibited. RAND documents are protected under copyright law. For information on reprint and linking permissions, please visit the RAND permissions page (http://www.rand.org/publications/permissions.html). Published 2009 by the RAND Corporation 1776 Main Street, P.O. Box 2138, Santa Monica, CA 90407-2138 1200 South Hayes Street, Arlington, VA 22202-5050 4570 Fifth Avenue, Suite 600, Pittsburgh, PA 15213-2665 RAND URL: http://www.rand.org To order RAND documents or to obtain additional information, contact Distribution Services: Telephone: (310) 451-7002; Fax: (310) 451-6915; Email: [email protected] Preface This monograph presents the results of a fiscal year 2008 study, “Defin- ing and Implementing Cyber Command and Cyber Warfare.” It dis- cusses the use and limits of power in cyberspace, which has been likened to a medium of potential conflict, much as the air and space domains are. The study was conducted to help clarify and focus attention on the operational realities behind the phrase “fly and fight in cyberspace.” The basic message is simple: Cyberspace is its own medium with its own rules. Cyberattacks, for instance, are enabled not through the generation of force but by the exploitation of the enemy’s vulnerabili- ties. Permanent effects are hard to produce. The medium is fraught with ambiguities about who attacked and why, about what they achieved and whether they can do so again. Something that works today may not work tomorrow (indeed, precisely because it did work today). Thus, deterrence and warfighting tenets established in other media do not necessarily translate reliably into cyberspace. Such tenets must be rethought. This monograph is an attempt to start this rethinking. The research described in this monograph was sponsored by Lt Gen Robert Elder, Jr., Commander, Eighth Air Force (8AF/CC), and Joint Functional Component Commander for Space and Global Strike, United States Strategic Command. The work was conducted within the Force Modernization and Employment Program of RAND Project AIR FORCE. It should be of interest to the decisionmakers and policy researchers associated with cyberwarfare, as well as to the Air Force planning community. iii iv Cyberdeterrence and Cyberwar RAND Project AIR FORCE RAND Project AIR FORCE (PAF), a division of the RAND Cor- poration, is the U.S. Air Force’s federally funded research and devel- opment center for studies and analyses. PAF provides the Air Force with independent analyses of policy alternatives affecting the devel- opment, employment, combat readiness, and support of current and future aerospace forces. Research is conducted in four programs: Force Modernization and Employment; Manpower, Personnel, and Train- ing; Resource Management; and Strategy and Doctrine. Additional information about PAF is available on our Web site: http://www.rand.org/paf/ Contents Preface ............................................................................. iii Figures ............................................................................. ix Tables .............................................................................. xi Summary .........................................................................xiii Acknowledgements ............................................................. xxi Abbreviations .................................................................. xxiii CHAPTER ONE Introduction ....................................................................... 1 Purpose .............................................................................. 5 Basic Concepts and Monograph Organization ................................. 6 CHAPTER TWO A Conceptual Framework ......................................................11 The Mechanisms of Cyberspace .................................................12 External Threats ...................................................................13 Internal Threats ................................................................... 20 Insiders .......................................................................... 20 Supply Chain ....................................................................21 In Sum .......................................................................... 22 Defining Cyberattack ............................................................ 23 Defining Cyberdeterrence ....................................................... 27 CHAPTER THREE Why Cyberdeterrence Is Different ............................................39 Do We Know Who Did It? ......................................................41 v vi Cyberdeterrence and Cyberwar Can We Hold Their Assets at Risk? .............................................52 Can We Do So Repeatedly? .................................................... 56 If Retaliation Does Not Deter, Can It at Least Disarm? .....................59 Will Third Parties Join the Fight? ...............................................62 Does Retaliation Send the Right Message to Our Own Side?.............. 64 Do We Have a Threshold for Response? .......................................65 Can We Avoid Escalation? .......................................................69 What If the Attacker Has Little Worth Hitting? ..............................70 Yet the Will to Retaliate Is More Credible for Cyberspace ..................71 A Good Defense Adds Further Credibility ....................................73 CHAPTER FOUR Why the Purpose of the Original Cyberattack Matters ..................75 Error ................................................................................76 Oops ..............................................................................76 No, You Started It ............................................................. 77 Rogue Operators ................................................................78 The Command-and-Control Problem ........................................78 Coercion ............................................................................79 Force ................................................................................82 Other .............................................................................. 86 Implications ....................................................................... 90 CHAPTER FIVE A Strategy of Response ..........................................................91 Should the Target Reveal the Cyberattack?
Recommended publications
  • Nationalism; *Peace; Political Attitudes; Slvery; Terrorism; Violence; War; World Problems IDENTIFIERS *Africa; *Peace Education
    DOCUMENT RESUME ED 396 074 CE 070 196 AUTHOR Kisembo, Paul TITLE A Popular Version of Yash Tandon's Militarism and Peace Education in Africa. INSTITUTION African Association for Literacy and Adult Education. Nairobi (Kenya). PUB DATE 93 NOTE 52p. PUB TYPE Viewpoints (Opinion/Position Papers, Essays, etc.) (120) EDRS PRICE MF01/PC03 Plhs Postage. DESCRIPTORS Adult Education; *Civil Liberties; Civil Rights; *Colonialisn; Community Education; Conflict Resolution; Developing Nations; Economic Development; Foreign Countries; *Freedom; International Relations; *Nationalism; *Peace; Political Attitudes; Slvery; Terrorism; Violence; War; World Problems IDENTIFIERS *Africa; *Peace Education ABSTRACT This book is a briefer, simpler popular edition of "Militarism and Peace Education in Africa." It is intended to interest the African peoples in the problems of peace and allow them to discuss and debate the issues of militarism and peace for Africa and to suggest solutions. It is also intended to interest leading organizations and people working at the grassroots level in urban and rural areas in problems of militarism and peace education. The first two chapters show hoW, in former times, militarism was brought to Africa by the Europeans through slave trade and colonialism. Chapter 3 shows how militarism continued after independence under neocolonialism in these forms: state terrorism, militarism based on ethnic nationality/conflicts, militarism resulting from "pastoralist conflicts," militarism resulting from cultural and religious conflicts, and militarism based on ideological conflicts. Chapter 4 explores how militarism is still connected to the exploitation and oppression of Africa with the new strategy called "low intensity conflict" or "low intensity war." Chapter 5 considers developing types of peace education and proposed content of peace education.
    [Show full text]
  • Analysis of Cyberwarfare Ethics As It Pertains to Civilian Computer Networks/Infrastructures
    Analysis of Cyberwarfare Ethics as It Pertains to Civilian Computer Networks/Infrastructures Vanessa Paradine Terms of Reference and Scope The Department of Defense (DoD) currently operates more than fifteen thousand different computer networks across four thousand military installations around the world, with as many as seven million DoD computers and telecommunications tools in use in eighty-eight countries.1 These networks experience over six million unauthorized probes per day.2 Due to the close integration of DoD and commercial networks, an attack within the cyber domain may significantly impact critical civilian infrastructures and networks. For the purpose of this article, the following definitions are pro­ vided: • Cyberspace, as defined by the National Security Presidential Di­ rective 541H0meland Security Presidential Directive 23, is "the interdependent network of information technology infrastruc­ tures, and includes the Internet, telecommunications networks, computer systems, and embedded processors and controllers in critical industries."3 • Cyberspace operations is defined as "the employment of cy­ berspace capabilities where the primary purpose is to achieve military objectives or effects in or through cyberspace."4 • Cyberwarfare/cyberattack has not been defined by the Depart­ ment of the Defense (DoD); however, according to Deputy Defense Secretary William J. Lynn III, it can include a range of things-"from exploitation and exfiltration of data to degrada­ tion of networks to destruction of networks or even physical equipment, physical property."5 • Cyber Threats6 o Virtual-nonkinetic threats to DoD information networks that are just as real and damaging as physical threats. 34 Internatianal Journal of Intelligence Ethics, Vol. 4, No. 1 / Spring/Summer 2013 Analysis of Cyberwarfare Ethics 35 o Physical-kinetic threats mixed with nonkinetic threats; can severely impact the effectiveness of military joint operations.
    [Show full text]
  • Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress
    Order Code RL32114 Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress Updated January 29, 2008 Clay Wilson Specialist in Technology and National Security Foreign Affairs, Defense, and Trade Division Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress Summary Cybercrime is becoming more organized and established as a transnational business. High technology online skills are now available for rent to a variety of customers, possibly including nation states, or individuals and groups that could secretly represent terrorist groups. The increased use of automated attack tools by cybercriminals has overwhelmed some current methodologies used for tracking Internet cyberattacks, and vulnerabilities of the U.S. critical infrastructure, which are acknowledged openly in publications, could possibly attract cyberattacks to extort money, or damage the U.S. economy to affect national security. In April and May 2007, NATO and the United States sent computer security experts to Estonia to help that nation recover from cyberattacks directed against government computer systems, and to analyze the methods used and determine the source of the attacks.1 Some security experts suspect that political protestors may have rented the services of cybercriminals, possibly a large network of infected PCs, called a “botnet,” to help disrupt the computer systems of the Estonian government. DOD officials have also indicated that similar cyberattacks from individuals and countries targeting economic,
    [Show full text]
  • The Effectiveness of Influence Activities in Information Warfare
    The Effectiveness of Influence Activities in Information Warfare Cassandra Lee Brooker A thesis submitted in fulfilment of the requirements for the degree of Master of Research School of Business May 2020 Thesis/Dissertation Sheet Surname : BROOKER Given Name/s : CASSANDRA LEE Abbreviation for degree : MRes Faculty : UNSW Canberra School : School of Business Thesis Title : The Effectiveness of Influence Activities in Information Warfare Abstract Rapid, globalised power shifts, technological advances, and increasingly interconnected, ungoverned communications networks have resulted in the rise of asymmetric grey zone threats. The lines are now blurred between political, civil, and military information environments. The rise of influence activities is the new ‘sharp power’ in information warfare (the iWar). Western democracies are already at war in the information domain and are being out-communicated by their adversaries. Building on the commentary surrounding this contemporary threat, and based on a review of the literature across three academic disciplines of: Systems Thinking, Influence, and Cognitive Theory; this study aimed to investigate solutions for improving Australia’s influence effectiveness in the iWar. This study asked how systems thinking can offer an effective approach to holistically understanding complex social systems in the iWar; as well as asking why understanding both successful influencing strategies and psychological cognitive theories is central to analysing those system behaviours. To answer the aim, a systems thinking methodology was employed to compare two contrasting case studies to determine their respective influencing effectiveness. The successful case system comprising the terrorist group ISIS was compared and contrasted with the unsuccessful case system of Hillary Clinton’s 2016 election campaign – using a single stock of influence to determine relevant reinforcing and balancing feedback.
    [Show full text]
  • Ransomware Facts and Tips
    RANSOMWARE FACTS & TIPS As technology evolves, the prevalence of ransomware attacks is growing among businesses and consumers alike. It’s important for digital citizens to be vigilant about basic digital hygiene in an increasingly connected world. WHAT IS RANSOMWARE? Ransomware is a type of malware that accesses a victim’s files, locks and encrypts them and then demands the victim to pay a ransom to get them back. Cybercriminals use these attacks to try to get users to click on attachments or links that appear legitimate but actually contain malicious code. Ransomware is like the “digital kidnapping” of valuable data – from personal photos and memories to client information, financial records and intellectual property. Any individual or organization could be a potential ransomware target. WHAT CAN YOU DO? We can all help protect ourselves – and our organizations – against ransomware and other malicious attacks by following these STOP. THINK. CONNECT. tips: • Keep all machines clean: Keep the software on all Internet-connected devices up to date. All critical software, including computer and mobile operating systems, security software and other frequently used programs and apps, should be running the most current versions. • Get two steps ahead: Turn on two-step authentication – also known as two-step verification or multi-factor authentication – on accounts where available. Two-factor authentication can use anything from a text message to your phone to a token to a biometric like your fingerprint to provide enhanced account security. • Back it up: Protect your valuable work, music, photos and other digital information by regularly making an electronic copy and storing it safely.
    [Show full text]
  • Attribution and Response to Cybercrime/Terrorism/Warfare Susan W
    Journal of Criminal Law and Criminology Volume 97 Article 2 Issue 2 Winter Winter 2007 At Light Speed: Attribution and Response to Cybercrime/Terrorism/Warfare Susan W. Brenner Follow this and additional works at: https://scholarlycommons.law.northwestern.edu/jclc Part of the Criminal Law Commons, Criminology Commons, and the Criminology and Criminal Justice Commons Recommended Citation Susan W. Brenner, At Light Speed: Attribution and Response to Cybercrime/Terrorism/Warfare, 97 J. Crim. L. & Criminology 379 (2006-2007) This Symposium is brought to you for free and open access by Northwestern University School of Law Scholarly Commons. It has been accepted for inclusion in Journal of Criminal Law and Criminology by an authorized editor of Northwestern University School of Law Scholarly Commons. 0091-4169/07/9702-0379 THE JOURNALOF CRIMINAL LAW & CRIMINOLOGY Vol. 97. No. 2 Copyright 0 2007 by NorthwesternUniversity. Schoolof Low Printedin U.S.A. "AT LIGHT SPEED": ATTRIBUTION AND RESPONSE TO CYBERCRIME/TERRORISM/WARFARE SUSAN W. BRENNER* This Article explains why and how computer technology complicates the related processes of identifying internal (crime and terrorism) and external (war) threats to social order of respondingto those threats. First, it divides the process-attribution-intotwo categories: what-attribution (what kind of attack is this?) and who-attribution (who is responsiblefor this attack?). Then, it analyzes, in detail, how and why our adversaries' use of computer technology blurs the distinctions between what is now cybercrime, cyberterrorism, and cyberwarfare. The Article goes on to analyze how and why computer technology and the blurring of these distinctions erode our ability to mount an effective response to threats of either type.
    [Show full text]
  • Agile Command Capability: Future Command in the Joint Battlespace and Its Implications for Capability Development
    UNCLASSIFIED DRAFT AGILE COMMAND CAPABILITY: FUTURE COMMAND IN THE JOINT BATTLESPACE AND ITS IMPLICATIONS FOR CAPABILITY DEVELOPMENT Steven J. Harland, MPhil(Cantab), C. Psychol, FRSA Gregory Harland Ltd Surrey Research Park Guildford GU2 7YG United Kingdom Paul J. Shanahan, PhD Gregory Harland Ltd Surrey Research Park Guildford GU2 7YG United Kingdom Cdr David J. Bewick MA RN Command Development Directorate of Command and Battlespace Management/J6 Ministry of Defence St Giles Court 1-13 St Giles High Street London WC2H 8LD United Kingdom UNCLASSIFIED DRAFT UNCLASSIFIED DRAFT AGILE COMMAND CAPABILITY: FUTURE COMMAND IN THE JOINT BATTLESPACE AND ITS IMPLICATIONS FOR CAPABILITY DEVELOPMENT1 Steven J. Harland, MPhil(Cantab), C. Psychol, FRSA Gregory Harland Ltd Surrey Research Park Guildford GU2 7YG United Kingdom Paul J. Shanahan, PhD Gregory Harland Ltd Surrey Research Park Guildford GU2 7YG United Kingdom Cdr David J. Bewick, MA RN Command Development Directorate of Command and Battlespace Management/J6 Ministry of Defence St Giles Court 1-13 St Giles High Street London WC2H 8LD United Kingdom Command cannot be understood in isolation. The available data processes technology and the nature of armaments in use; tactics and strategy; organisational structure and manpower systems; training, discipline, and…the ethos of war; the political construction of states and the social makeup of armies – all these things and many more impinge on command in war and in turn are affected by it.2 Martin van Creveld, Command in War ABSTRACT The paper defines the Ministry of Defence (MoD) requirements for Future Command3 within the context of the United Kingdom’s (UK) Joint Higher Level Operational Concept (HLOC).
    [Show full text]
  • The Order of Encryption and Authentication for Protecting Communications (Or: How Secure Is SSL?)?
    The Order of Encryption and Authentication for Protecting Communications (Or: How Secure is SSL?)? Hugo Krawczyk?? Abstract. We study the question of how to generically compose sym- metric encryption and authentication when building \secure channels" for the protection of communications over insecure networks. We show that any secure channels protocol designed to work with any combina- tion of secure encryption (against chosen plaintext attacks) and secure MAC must use the encrypt-then-authenticate method. We demonstrate this by showing that the other common methods of composing encryp- tion and authentication, including the authenticate-then-encrypt method used in SSL, are not generically secure. We show an example of an en- cryption function that provides (Shannon's) perfect secrecy but when combined with any MAC function under the authenticate-then-encrypt method yields a totally insecure protocol (for example, ¯nding passwords or credit card numbers transmitted under the protection of such protocol becomes an easy task for an active attacker). The same applies to the encrypt-and-authenticate method used in SSH. On the positive side we show that the authenticate-then-encrypt method is secure if the encryption method in use is either CBC mode (with an underlying secure block cipher) or a stream cipher (that xor the data with a random or pseudorandom pad). Thus, while we show the generic security of SSL to be broken, the current practical implementations of the protocol that use the above modes of encryption are safe. 1 Introduction The most widespread application of cryptography in the Internet these days is for implementing a secure channel between two end points and then exchanging information over that channel.
    [Show full text]
  • Opentext Product Security Assurance Program
    The Information Company ™ Product Security Assurance Program Contents Objective 03 Scope 03 Sources 03 Introduction 03 Concept and design 04 Development 05 Testing and quality assurance 07 Maintain and support 09 Partnership and responsibility 10 Privavy and Security Policy 11 Product Security Assurance Program 2/11 Objective The goals of the OpenText Product Security Assurance Program (PSAP) are to help ensure that all products, solutions, and services are designed, developed, and maintained with security in mind, and to provide OpenText customers with the assurance that their important assets and information are protected at all times. This document provides a general, public overview of the key aspects and components of the PSAP program. Scope The scope of the PSAP includes all software solutions designed and developed by OpenText and its subsidiaries. All OpenText employees are responsible to uphold and participate in this program. Sources The source of this overview document is the PSAP Standard Operating Procedure (SOP). This SOP is highly confidential in nature, for internal OpenText consumption only. This overview document represents the aspects that are able to be shared with OpenText customers and partners. Introduction OpenText is committed to the confidentiality, integrity, and availability of its customer information. OpenText believes that the foundation of a highly secure system is that the security is built in to the software from the initial stages of its concept, design, development, deployment, and beyond. In this respect,
    [Show full text]
  • Montesquieu on Commerce, Conquest, War and Peace Robert Howse
    Brooklyn Journal of International Law Volume 31 | Issue 3 Article 3 2006 Montesquieu on Commerce, Conquest, War and Peace Robert Howse Follow this and additional works at: https://brooklynworks.brooklaw.edu/bjil Recommended Citation Robert Howse, Montesquieu on Commerce, Conquest, War and Peace, 31 Brook. J. Int'l L. (2006). Available at: https://brooklynworks.brooklaw.edu/bjil/vol31/iss3/3 This Article is brought to you for free and open access by the Law Journals at BrooklynWorks. It has been accepted for inclusion in Brooklyn Journal of International Law by an authorized editor of BrooklynWorks. MONTESQUIEU ON COMMERCE, CONQUEST, WAR, AND PEACE * Robert Howse I. INTRODUCTION: COMMERCE AS THE AGENT OF PEACE: MONTESQUIEU AND THE IDEOLOGY OF LIBERALISM n the history of liberalism, Montesquieu, who died two hundred and I fifty years ago, is an iconic figure. Montesquieu is cited as the source of the idea of checks and balances, or separation of powers, and thus as an intellectual inspiration of the American founding.1 Among liberal internationalists, Montesquieu is known above all for the notion that international trade leads to peace among nation-states. When liberal international relations theorists such as Michael Doyle attribute this posi- tion to Montesquieu,2 they cite Book XX of the Spirit of the Laws,3 in which Montesquieu claims: “The natural effect of commerce is to bring peace. Two nations that negotiate between themselves become recipro- cally dependent, if one has an interest in buying and the other in selling. And all unions are based on mutual needs.”4 On its own, Montesquieu’s claim raises many issues.
    [Show full text]
  • The Disappearing Human: Gnostic Dreams in a Transhumanist World
    religions Article The Disappearing Human: Gnostic Dreams in a Transhumanist World Jeffrey C. Pugh Department of Religious Studies, Elon University, Elon, NC 27244-2020, USA; [email protected] Academic Editor: Noreen Herzfeld Received: 25 January 2017; Accepted: 18 April 2017; Published: 3 May 2017 Abstract: Transhumanism is dedicated to freeing humankind from the limitations of biological life, creating new bodies that will carry us into the future. In seeking freedom from the constraints of nature, it resembles ancient Gnosticism, but complicates the question of what the human being is. In contrast to the perspective that we are our brains, I argue that human consciousness and subjectivity originate from complex interactions between the body and the surrounding environment. These qualities emerge from a distinct set of structural couplings embodied within multiple organ systems and the multiplicity of connections within the brain. These connections take on different forms, including structural, chemical, and electrical manifestations within the totality of the human body. This embodiment suggests that human consciousness, and the intricate levels of experience that accompany it, cannot be replicated in non-organic forms such as computers or synaptic implants without a significant loss to human identity. The Gnostic desire to escape our embodiment found in transhumanism carries the danger of dissolving the human being. Keywords: Singularity; transhumanism; Merleau-Ponty; Kurzweil; Gnosticism; AI; emergence; technology 1. Introduction In 1993, the mathematician and science fiction writer Vernor Vinge gave a talk at the Vision 21 symposium sponsored by NASA introducing the idea of the Singularity, an evolutionary moment when we would create the capacity for superhuman intelligence that would transcend the human and take us into the posthuman world (Vinge 1993).
    [Show full text]
  • Address Munging: the Practice of Disguising, Or Munging, an E-Mail Address to Prevent It Being Automatically Collected and Used
    Address Munging: the practice of disguising, or munging, an e-mail address to prevent it being automatically collected and used as a target for people and organizations that send unsolicited bulk e-mail address. Adware: or advertising-supported software is any software package which automatically plays, displays, or downloads advertising material to a computer after the software is installed on it or while the application is being used. Some types of adware are also spyware and can be classified as privacy-invasive software. Adware is software designed to force pre-chosen ads to display on your system. Some adware is designed to be malicious and will pop up ads with such speed and frequency that they seem to be taking over everything, slowing down your system and tying up all of your system resources. When adware is coupled with spyware, it can be a frustrating ride, to say the least. Backdoor: in a computer system (or cryptosystem or algorithm) is a method of bypassing normal authentication, securing remote access to a computer, obtaining access to plaintext, and so on, while attempting to remain undetected. The backdoor may take the form of an installed program (e.g., Back Orifice), or could be a modification to an existing program or hardware device. A back door is a point of entry that circumvents normal security and can be used by a cracker to access a network or computer system. Usually back doors are created by system developers as shortcuts to speed access through security during the development stage and then are overlooked and never properly removed during final implementation.
    [Show full text]