Abstract
With the increased potential of a bona fide cyber terrorist attack and the possibility of a future “war in the wires”, we must continue to improve the education and training of individuals responsible for defending our national borders—whether those borders are physical or electronic. The Information Analysis and Research (IWAR) laboratory at the United States Military Academy (USMA) has proven to be an exceptional resource for such an education for our cadets and faculty studying information warfare and information assurance. The laboratory has also been successful in motivating the need for continued education and training in this area on a much larger scope. This paper justifies why information warfare laboratories are necessary, describes the phenomenon that is occurring as a result of the IWAR lab, explains the current configuration, and presents lessons learned that others might use in designing an Information Warfare laboratory. While this paper has a military context, the results apply to any university, corporation, or nonprofit organization desiring to increase awareness and improve education in the area of information warfare
Chapter PDF
Similar content being viewed by others
References
J. Schafer, D. J. Ragsdale, J. R. Surdu, and C. A. Carver, “The IWAR range: a laboratory for undergraduate information assurance education,” presented at Consortium for Computing in Small Colleges, Middlebury, Vermont, 2001.
D. W. Welch, D. J. Ragsdale, and W. Schepens, “Training for Information Assurance,” IEEE Computer, pp. 2–9, 2002.
J. Garamone, “Capabilities, Strategy Must Converge to Face New Threats,”, accessed on May 9, 2002.http://www.defenselink.mil
Department of Defense Report to Congress, “Network Centric Warfare,”, accessed on April 23, 2002.http://www.c3i.osd.mil
J. Garamone, “Land Warrior Coming to a Grunt Near You,”, accessed on April 15, 2002.http://www.defenselink.mill
G. Blackwell, “802.11’s in the Army Now,” accessed on April 15, 2002.http://www.80211planet.com/columns/article/0,4000,1781_1000821,00.html
CERT/CC Advisory CA-2001–23, “Continued Threat of the ”Code Red“ Worm,” , accessed on April 15, 2002.http://www.cert.org/advisories/CA-2001–23.html
R. M. Felder, “Reaching the Second Tie-Learning and Teaching Styles in College Science Education,” Journal of College Science Teaching, vol. 23, pp. 286–290, 1993.
C. E. Kaucher and J. H. Saunders, “Building an information assurance laboratory for graduate-level education,” presented at 6th National Colloquium for Information System Security Education, Redmond, WA, 2002.
M. Brakewood,“Question,” email to D. J. Ragsdale, March 05, 2002.
A. Yasinsac, J. Frazier, and M. Bogdanov, “Developing an Academic Security Laboratory,” presented at 6th National Colloquium for Information System Security Education, Redmond, WA, 2002.
G. A. Francia and R. K. Smith, “The Design and Implementation of a Heterogeneous Computer Networking Laboratory,” presented at 6th National Colloquium for Information System Security Education, Redmond, WA, 2002.
.J. H. Saunders, “Simulation Approaches in Information Security Education,” presented at 6th National Colloquium for Information System Security Education, Redmond, WA, 2002.
C. A. J. Carver, J. R. Surdu, J. M. D. Hill, D. J. Ragsdale, S. D. Lathrop, and T. Presby, “Military Academy Attack/Defense Network,” presented at 3rd Annual IEEE Information Assurance Workshop, West Point, NY, 2002.
VMware, VMware Workstation 3.0 User’s Manual, 2001.
The Honeynet Project, Know Your Enemy Revealing the Security Tools, Tactics, and Motives of the Blackhat Community. Boston: Addison-Wesley, 2002.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer Science+Business Media New York
About this paper
Cite this paper
Lathrop, S.D., Conti, G.J., Ragsdale, D.J. (2003). Information Warfare in the Trenches. In: Irvine, C., Armstrong, H. (eds) Security Education and Critical Infrastructures. WISE 2003. IFIP Advances in Information and Communication Technology, vol 125. Springer, New York, NY. https://doi.org/10.1007/978-0-387-35694-5_3
Download citation
DOI: https://doi.org/10.1007/978-0-387-35694-5_3
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4757-6491-8
Online ISBN: 978-0-387-35694-5
eBook Packages: Springer Book Archive