Accession Number : ADA326942

Title :   A National Security Strategy for Information Assurance.

Descriptive Note : Research rept.,

Corporate Author : ARMY WAR COLL STRATEGIC STUDIES INST CARLISLE BARRACKS PA

Personal Author(s) : Farrell, Peter T.

PDF Url : ADA326942

Report Date : 07 APR 1997

Pagination or Media Count : 35

Abstract : In one of his many best selling novels, Debt of Honor, Tom Clancy lays out a very frightening scenario. He describes how a brilliant but disgruntled Wall Street computer programmer, covertly financed by a wealthy group of foreign adversaries bent on toppling the United States, secretly implants a sophisticated computer virus that grossly distorts financial closing information on the New York Stock Exchange and helps to trigger panic buying on the stock market. In the novel, this malicious attack on the foundation of the American financial system was done without warning, was performed at little cost, and was carried out by a small group of adversaries who were, at least initially, anonymous players. Information age technologies have profoundly altered American society. Information itself has become a strategic national asset and the maintenance and protection of our information systems has become a vital national interest of the United States. Our dependence upon information technologies and the global connectivity of today's information systems result in a new strategic threat aimed at those information systems that control key aspects of our military, economic, and political power. Yet, our National Security Strategy fails to adequately address this emerging threat to this vital national interest and our way of life. Our nation must develop a comprehensive National Security Strategy to assure the security and integrity of our information systems. This strategy must outline the ends, ways, and means required to guarantee Information Assurance in the Information Age.

Descriptors :   *NATIONAL SECURITY, *THREAT EVALUATION, *ELECTRONIC SECURITY, MILITARY STRATEGY, POLICIES, DATA MANAGEMENT, INFORMATION EXCHANGE, INFORMATION SYSTEMS, COMPUTER COMMUNICATIONS, VULNERABILITY, ONLINE SYSTEMS, INTERNET.

Subject Categories : Computer Systems Management and Standards
      Military Intelligence

Distribution Statement : APPROVED FOR PUBLIC RELEASE