Font Size: a A A

Research And Application Of Computer Antagonism In Information Warfare

Posted on:2017-09-07Degree:MasterType:Thesis
Country:ChinaCandidate:J LiuFull Text:PDF
GTID:2348330533450093Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the coming of the information age, computer antagonism, as an important form of information war, has already come into reality. Computer antagonism between military hostile countries has emerged. Therefore, the research and application of computer antagonism in information warfare is significantly meaningful for national security and stability.This paper make systematical researches on the possible forms of computer antagonism and the strategies of our army in the information war, enriching and developing the computer antagonism theory. Several forms of computer antagonism including computer virus antagonism, computer hacker attack, high-power microwave weapon attack, nuclear-caused electromagnetic pulse destroy, communication scout and interference, and getting information from electromagnetic radiation of computer equipment. Emphatically, on the basis of expounding the mechanism of computer virus,the paper constructs the model of computer virus, the general model, the concrete model,and the experimental model of computer virus antagonism weapon system, and furthermore analyzes the system's performance index and evaluating method, and studies the key technologies of computer virus antagonism, and put forward the fighting principle that our army must take attacking as the first choice in information war.Finally, the paper discusses our army's possible strategies for computer antagonism,especially the tactical and technical way of dealing with computer virus, computer hacker, computer information leakage and communication scout and interference. The performance indexes system and key technologies of computer virus antagonism weapon system are analyzed, where the mathematical evaluation method(i.e.,quantitative method) and some key technologies need further research.
Keywords/Search Tags:Computer Antagonism, Computer Virus, Computer Information Leakage
PDF Full Text Request
Related items