Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

Australian Information Warfare and Security Conference

2006

[RSTDPub]

Articles 1 - 3 of 3

Full-Text Articles in Entire DC Network

An Information Operation Model And Classification Scheme, D T. Shaw, S Cikara Apr 2006

An Information Operation Model And Classification Scheme, D T. Shaw, S Cikara

Australian Information Warfare and Security Conference

Information systems are used in overt and covert conflict and information operations target an opponent’s ability to manage information in support of operations for political, commercial and military advantage. System level attacks are complicated by logistic problems that require resources, command and control. Node level attacks are practical but of limited value. Collocated equipment comprises a temporary node that may be feasibly attacked. Estimation of IW operation merits may founder on the difficulty of predicting the net benefit for the costs. Starting from with Shannon’s model, a simple costbenefit model is discussed. Existing models are extended by an IW attack …


Mediated Identification, D T. Shaw Apr 2006

Mediated Identification, D T. Shaw

Australian Information Warfare and Security Conference

Identity and identification are linked by variable meanings and applications and are essential in many remote transactions. Identification relying on mediation or third party intervention may be modified or withdrawn at will. Creating or reestablishing identity may require time and resources including artefacts such as the identity card usually sourced from a third party. The characteristics of the identification process and artefacts are discussed and the requirements of usermediated identification artefacts are explored. The implicit link between user identity and artefact identity may be broken under certain circumstances.


Security Risk Assessment: Group Approach To A Consensual Outcome, Ben Beard, David J. Brooks Apr 2006

Security Risk Assessment: Group Approach To A Consensual Outcome, Ben Beard, David J. Brooks

Australian Information Warfare and Security Conference

AS/NZS4360:2004 suggests that the risk assessment process should not be conducted or information gathered in isolation. This insular method of data collection may lead to inaccurate risk assessment, as stakeholders with vested interests may emphasise their own risks or game the risk assessment process. The study demonstrated how a consensual risk assessment approach may result in a more acceptable risk assessment outcome when compared to individual assessments. The participants were senior managers at a West Australian motel located on the West Coast Highway, Scarborough. The motel consists of four three storey blocks of units, resulting in a total of 75 …