Chapter 1. Introduction To IAS
Chapter 1. Introduction To IAS
Chapter 1. Introduction To IAS
- Hermann
LET’S MATCH
Desired Effects:
To affect the technical performance and the capability of physical
systems, to disrupt the capabilities of the defender.
Attacker’s operations:
Physical attack and destruction, including electromagnetic attack, visual
spying, intrusion, scavenging and removal, wiretapping, interference,
and eavesdropping.
Defender’s operation:
Physical security
2 N D LEVEL: INFO INFRASTRUCTURE
• COMPUTER SECURITY
• COMMUNICATIONS AND NETWORK SECURITY
• IT SECURITY (combination of comsec and compsec)
• OPERATIONS SECURITY
QUOTE
Capability Restoration:
• “relies on established procedures and mechanisms for prioritizing
restoration of essential functions. Capability restoration may rley on
backup or redundant links, information system components, or
alternative means of information transfer.”
• “A post-attack analysis should be conducted to determine the
command vulnerabilities and recommended security improvements.”
IA FUNCTIONS