Validation Method of a Telecommunications Blackout Attack
MILITARY ACADEMY LISBON (PORTUGAL)
Pagination or Media Count:
This paper presents an evaluation method of telecommunications infrastructure vulnerabilities, allowing the identification of components that can be attacked in order to achieve a communications blackout. Exploring those components it is possible to define a scenario and conduct case studies analysis and experiments that can be used to assess the vulnerabilities of a real world situation. The conceptual framework basic idea is to identify points that can be attacked using unsophisticated technology in order to achieve serious damages on the different network infrastructures, and to obtain the maximum disruptive effect over the services. The proposed method uses a top-down approach, starting on the service level and ending on the different network elements that can be identified in the end as the targets for the attack.
- Radio Communications
- Non-Radio Communications
- Civil Defense