Chinese Academy of Engineering, Shen Changxiang
The information war is a computer network as the battlefield, computer technology as the core, is a weapon. It is a more intelligence to attack the enemy's information system as the main means to destroy the enemy's core information system, which is the "first" in modern war. A strike target. " To win a message war, the key is how to destroy the enemy information system and effectively guarantee the security of its own information system, establish an information defense system for the attack and defense, and seize the control of battlefield information.
1, network and information security
Today, the world's information technology is rapidly developed. Human society is entering an information society, the development of social and economic development is increasingly dependent on information resources, information technology and information industries. In the information society, the information has become a valuable resource of mankind. In recent years, Internet technology has been developed globally in an amazing speed, and Internet technology has been widely penetrated into various fields. However, the security issues of network systems from the development of the Internet have become increasingly prominent and have received more and more attention. Therefore, network security has become a major strategic issue for relations with national security. Information is strategic resources, information is the source of decision making, is the soul of the battlefield, and the information determines the fire and motor power. Information can greatly expand the coordination of army intelligence and nerve (command) system, military information is a comprehensive deep revolution.
Currently, the military security issues raised by the Taiwan issue are the most prominent problems in national security, which will exceed the status of other elements such as economic security. Therefore, my country must attach great importance to the information war from the strategy. It must be recognized that the future war will mainly be the information war. The information war will be mainly based on the global computer network, to attack the other party's information system as the main means, using high-efficient computer technology, not only destroying military command and weapons control system, but also makes it finance, transportation, business, Many systems such as medical, electricity, etc. have been destroyed, thus not cost a shot of a gun to achieve the purpose of siege.
2, the main means of network information war
Informatization first, the network is the basis for the use of information resources. Therefore, the information war will begin in the network attack and defense, and the main means of attacks are hackers and viruses.
2.1
The information warfaction is to attack the computer network. Since this type of attack is to use a vulnerability you know in the system security structure, only the characteristics of a particular system are valid. There are a lot of tricks in black. Attackers can be on site or in any other place. There are a variety of attackers, from causing the entire system to cause intermittent shutdown, random data error, a large number of theft information, theft service, and introduce fake and extract data for fraud.
Hackers' attacks on military information systems can add conventional military operations and other forms of information warfare. The extremely important military information system is designed to ensure very safe and have sufficient redundancy to defeat this attack. The United States believes that hackers have an attack of commercial information systems to interfere with political leaders to implement national security. The hacker war in February last year's anti-service (DOS) has made many people think that the United States is victim. US Department of Defense officials said that the attack actions for the Ministry of National Defense Computer System have caused considerable losses. The attacker has stolen, modified, and destroyed the data and software, and they even installed "latte", and the attacker can use this "back door" in the future to bypass system defense to conduct illegal access. They closed the entire system and network, so that users who rely on the automation system complete important tasks cannot obtain services, so that many national defense can only be adversely affected, including weapons and supercomputer calculations, logistics, financial procurement, Personnel management, military system and salary system.
However, the Internet mainly flows on the United States, 80% of the information flowing on the Internet, and many communications between countries around the world have to detour the United States, so it can be said that the United States is actually in the battlefield of the information war. After the Americans control the right to make such information rights, they still have everywhere? Quot; Information Pearl Port ", calling many countries with rogue countries, undermining the order of the Web World. In fact, the United States is victim, but it is also beneficiaries. This way to kill, the network on the United States is better than others, and the United States will quickly improve the network space. 2.2 virus war
If the hacker invasion computer network event is to steal information information from the computer network. Then computer virus is a method of attacking a computer network inward. At present, computer viruses have already stirred the world, and it will continue to be fierce in the future information battlefield, and become a high-tech weapon for all countries that have to deal with them.
With the development of computer technology and the increase in the level of modern war on computer systems and network dependence, it provides the possibility for computer virus battles. If it is destroyed as a C3i system and combat weapon system for the National Defense Central Nervous, it will cause a comprehensive paralysis of defense facilities. And this approach is more ideal than using precisely guided weapons and nuclear explosions, and more threatens.
Computer viruses have become more and more emphasis on the military virus as a new type of electronic warfare weapon by computer virus. The United States is a computer virus research earlier country, and allocated special funds to study more effective military computer viruses. Taiwan is now in response to the mainland of the motherland, and the specific situation of our army has vigorously develops information warfare weapons, including viruses. In August 1999, the Taiwan "National Defense" held a special meeting on the information war. In addition to the senior general of the Taiwan "Ministry of National Defense" and the so-called "Minister of Defense", the personnel of the Secretary of Defense, there are high-end representatives of computer hardware and software manufacturers, computer experts, and viruses, including CIA viruses, Chen Yinghao. The central issue of the meeting is how to use Taiwan's powerful computer hardware and software advantages, and implement the information war for the mainland of the motherland. The specific steps include injecting a viral chip to China's exports, if necessary, by remote activation. This method is definitely available in technology. In addition, January 9, this year, the Taiwan "Free Times" reported that the Secretary of the Taiwan "Ministry of National Defense" Communications Electronic Information Bureau said that there have been a thousand viruses in mainland China to deal with the information infrastructure in mainland China. All of these facts have explained that computer virus battles have entered reality from imagination. Computer virus war has become a new, important topic of modern electronic information warfare.
As the weapon of the information war, the focus and key technologies of the offensive and defense confrontation are the production technology, injection technology, activation technology and isolation technology of the virus, where the most difficult force is the largest of the injection, activation and isolation technology. Strengthen the research and testing of computer virus war, first of all, the study of computer viruses, performance, interference mechanism, strengthen computer virus injection, activation, coupling technology research and computer virus defense technology. But to fundamentally solve the problem, you must use our own safety equipment to strengthen information and network security, and need to vigorously develop information security industry based on autonomous technology, and the development of autonomous technology must be based on information and network security. Studies have adapted to improve innovation capabilities. In this way, it is difficult to safely utilize the key information system that fundamentally introduces foreign countries.
3, a few points of thinking
3.1 Advantages and disadvantages of the information war
Shortly after the end of the Gulf War, officials of the US Department of Defense were celebrating the information warfare, can't help but think of the safety of the US own computer network system. They ask themselves, if the enemy lays similar information warfare to the US military, can the US military have to live?
In fact, the US military has the largest computer network system in the world, which is called "National Defense Information Infrastructure" is 2.1 million computer, 10,000 LAN, 100 WAN, 200 command centers. Composed of 16 large computer centers. The US military is the world's most dependent on computer network, from military command, weaponry, until the person is mobilized, and the distribution of the army, which is inseparable from the computer. Therefore, the information war is a double-edged sword. The United States can use it to attack others, and other countries can also "treat them with their people." Especially since the 1990s, computer communication technology has not only widely popular in developed countries, but also in emerging countries, even in some developing countries are promotion. The information war with network security technology is basically a more intelligence, rather than like a routine war. Therefore, in this war in this information war, the gap between developed countries and non-developed countries is far less than their gap in the regular war. It can be said that the information war is a low-cost war, and everyone is playing. The advantage of the US military on weapons and equipment is probably not an important factor in the information war. Our strategy should lead to avoid weaknesses. For China's national conditions, with its efforts, material and financial resources to pursue weapons and equipment, it is not as strong as intended to invest in information war research, construction strikes and protection as the core of information warfare weapons, learn from world advanced technology and lessons, Independently constructing information security system, raising information system security construction to "two bomb one star" high-fertilized fresh Ding u 獠 獠 獠 呒 呒 呒 跫 跫 ⒄ ⒄ ⒄ ⒄ 降 氖 ⒄ ⒄ 绞 φ ⒓ 蟮 蟮 率 率 诹 遣 艽虻 诹 诹 诹 诹 P> 3.2 occupation of network system
The future battlefield of the information war will be very intense. The network is the high-end, network attack and network protection of the hostile, and network attacks and network protection have become a new style of future military operations. For the party, the network can use the network to attack the exact blow of the virus attack, the "Network Warrior" attack and the information combat platform, and there is a new way of infiltration, information dismember, information covering. For the one party of the defense, the virus counterattack, the information weapon counterattack has also added new content to the military combat, with toxicity, virtual induction, anti-information penetration into a new battle. The emergence of the Internet has opened up a new field for military confrontation. Once the network battlefield is formed, psychological war, intelligence warfare, economic information war, etc., the network war is penetrating, and the fire fighting, the mobile battle is integrated, the "soft" attack and fire fighting, the "hard" of the mobile phone war is destroyed. , Combat efficiency will exceed pure "hard destruction" and even dozens of times.
Network security will be a military confrontation focus in the 21st century. Network guards will have to become new forces. The US military established a new military troops called computer network guards. US National Defense University has information war officer graduates, is the first network guards. The online guards will widely have a straightforward team of all military and soldiers and general commands, which are responsible for the security of all kinds of forces, campaign and tactical computer systems and computer networks, network health will be , Network anti-virus troops, network definition forces and network countermatings. This movement of the United States is worthy of our attention, we need to manufacture people, occupying high networks.
3.3 Safety Defense System
Modern information systems are supported by network support, to enable information systems from hackers, viruses, key to establish a security defense system, from information confidentiality (to ensure that information does not leak to unauthorized people), Expanding the integrity of the information (prevent information from being unauthorized tampering, ensuring real information from the real source without distortion reaching the real bandke), the availability of information (guarantee information and information system indeed authorized users, Prevent system rejection services caused by computer viruses or other human factors, or can be used for hostile (safe monitoring management of information and information systems), information is undispired (guaranteeing information behavior no denying Behavior), etc. The security defense system is a systematic project that includes many aspects such as technology, management and legislation. For convenience, we simplify it into the structure expressed in a three-dimensional frame. Its constituent elements are safety characteristics, system units and open interconnect reference model structures.
Figure 1: Security defense architecture framework
Safety features detail the security services and security mechanisms of computer information systems, including identification, access control, data confidentiality, complete data, to prevent denial, audit management, availability, and reliability. Computer information systems that take different safety policies or at different safety levels can have different security features. System cell dimensions include components of the computer information system, as well as physical and administrative environments for use and managing information systems. Open System Interconnection Reference Model Structure Hierarchy describes hierarchies of the level computer information system.
The framework is a three-dimensional space that breaks through the old model of the problem in the past, and is planned from the top. It accommodates safety elements such as physical, regulations, and personnel, involving various decrees, regulations, regulations, and systems such as system security and personnel, etc., are considered by them.
In addition, from the information war, negative defense is not enough, it should be equivalent to attack and defense, and it is necessary to detect vulnerabilities, emergency response and rapid recovery generation on the basis of protection.
At present, all countries in the world have grasp the strengthening of information security defense systems. The United States implemented the "Information System Protection National Plan V1.0" in May 2000, fundamentally improved the prevention of information system intrusion and failure. my country urgently needs to strengthen the information security system to establish the information security strategy and defense system of our army. This is both the needs of the times, and it is also the need of national security strategy and military development. It is also a need for real struggle. It is a historical task that is in front of people.