Re-Integrating Influence and Cyber Operations (Paperback)


The art of influence operations as a subset to information operations as well as personnel that practice influence operations for the military have been doctrinally removed from conducting cyber operations. With the openness that the military has created to social networking as a tool for soldiers, the fact that many of the greatest cyber espionage tactics involve a form of influence operations tactic, often in the form of social engineering, to gain, maintain and exploit networks. Continued ignorance in this subject area will lead to exploitable vulnerabilities as well as reduce the military capability to utilize potential attack vectors. This research presents the reasons behind the separation, and a methodology for getting the two independent operational capabilities to re-integrate, and justifies this as the first step towards a Virtual Intelligence, Surveillance, and Reconnaissance(VISR) capability.

R1,412

Or split into 4x interest-free payments of 25% on orders over R50
Learn more

Discovery Miles14120
Mobicred@R132pm x 12* Mobicred Info
Free Delivery
Delivery AdviceShips in 10 - 15 working days


Toggle WishListAdd to wish list
Review this Item

Product Description

The art of influence operations as a subset to information operations as well as personnel that practice influence operations for the military have been doctrinally removed from conducting cyber operations. With the openness that the military has created to social networking as a tool for soldiers, the fact that many of the greatest cyber espionage tactics involve a form of influence operations tactic, often in the form of social engineering, to gain, maintain and exploit networks. Continued ignorance in this subject area will lead to exploitable vulnerabilities as well as reduce the military capability to utilize potential attack vectors. This research presents the reasons behind the separation, and a methodology for getting the two independent operational capabilities to re-integrate, and justifies this as the first step towards a Virtual Intelligence, Surveillance, and Reconnaissance(VISR) capability.

Customer Reviews

No reviews or ratings yet - be the first to create one!

Product Details

General

Imprint

Biblioscholar

Country of origin

United States

Release date

November 2012

Availability

Expected to ship within 10 - 15 working days

First published

November 2012

Authors

Dimensions

246 x 189 x 4mm (L x W x T)

Format

Paperback - Trade

Pages

82

ISBN-13

978-1-288-31580-2

Barcode

9781288315802

Categories

LSN

1-288-31580-5



Trending On Loot