The IT Law Wiki


32,081pages on
this wiki
Add New Page
Add New Page Talk0

Definitions Edit

Computing Edit

Disruption is

an event that causes a computer program, computer, computer system, network, or component thereof, to be inoperable, or operate in an unintended manner, for a length of time due to destruction of and/or interference with a computer program, computer, computer system, network, computer data, content data, and/or traffic data.[1]

Electronic warfare Edit

Disruption aims to confuse or delay enemy action. Forces achieve disruption with electromagnetic jamming, electromagnetic deception, and electromagnetic intrusion.

General Edit

Disruption is

[a]n unplanned event that causes the general system or major application to be inoperable for an unacceptable length of time (e.g., minor or extended power outage, extended unavailable network, or equipment or facility damage or destruction).[2]
[a]n event which causes unplanned interruption in operations or functions for an unacceptable length of time.[3]
[d]enial of service or corruption of information resulting from a single event, cause, or source; whether direct or indirect, accidental or intentional, rare or common.[4]

Overview (Electronic warfare) Edit

"Disruption techniques interfere with the adversary's use of the electromagnetic spectrum to limit adversary combat capabilities. Disruption resembles denial but is not as comprehensive in execution or impact on the enemy. A trained enemy operator can thwart disruption through electronic protection measures, such as procedures to counter communications jamming. Disruption enhances attacks on hostile forces and acts as a force multiplier by increasing adversary uncertainty while reducing uncertainty for friendly forces. Advanced electronic attack activities offer the opportunity to nondestructively disrupt or degrade adversary infrastructure."[5]

Overview (Infrastructure) Edit

Disruption of any infrastructure is inconvenient and can be costly and even life threatening. Major disruptions could lead to major losses and affect national security, the economy, and the public good. Mutual dependence and the interconnectedness made possible by the information and communications infrastructure has lead to the possibility that infrastructures may be vulnerable in ways they never have been before. Intentional exploitation of these new vulnerabilities could have severe consequences for our economy, security, and way of life.

References Edit

  1. Toolkit for Cybercrime Legislation.
  2. NIST Special Publication 800-34.
  3. NICCS, Explore Terms: A Glossary of Common Cybersecurity Terminology (full-text).
  4. Glossary of Communication Electronic Terms, at 2-55.
  5. FM 3-36, at 1-10.

See also Edit

Also on Fandom

Random Wiki