1 / 20

Information Warfare Playgrounds to Battlegrounds

Information Warfare Playgrounds to Battlegrounds. Last Class: Theory of IW. Information resources Players Offensive operations Defensive operations. WIN-LOSE NATURE OF OPERATIONS. Security Objectives. Confidentiality Integrity Availability. Offense and Defense.

bconti
Download Presentation

Information Warfare Playgrounds to Battlegrounds

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Information WarfarePlaygrounds to Battlegrounds

  2. Last Class: Theory of IW • Information resources • Players • Offensive operations • Defensive operations WIN-LOSE NATURE OF OPERATIONS

  3. Security Objectives Confidentiality Integrity Availability

  4. Offense and Defense

  5. Offense: Increased availability • Collection of secret: • Espionage (illegal) and intelligence(may be legal) • Piracy • Penetration (hacking) • Superimposition fraud (use by the offense on the defense’s legitimate usage) • Identity theft • Perception management (affect beliefs and behavior)

  6. Offense: Decrease Availability for Defense • Physical theft • Sabotage • Censorship

  7. Offense: Decreased Integrity • Tampering • Penetration • Cover up • Virus, worm, malicious code • Perception management • Fabrication, forgeries, fraud, identity theft, social engineering

  8. Defense – What Not to do Closing The Barn Door After The Horse Is Gone From: http://blog.johnlund.com/2013/10/closing-barn-door-after-horse-is-gone.html

  9. Defense • Emergency preparedness: capability to recover from and response to attacks • Prevention: keeps attacks from occurring • Deterrence: makes attack unattractive • Indications and warning: recognize attacks before it occurs • Detection: recognize attacks • Response: actions taken after the attack

  10. Playgrounds to Battlegrounds

  11. IW Activities • Context of human actions and conflict • Domains: • Play: hackers vs. owners • Crime: perpetrators vs. victims • Individual rights: individuals vs. individuals/organizations/government • National security: national level activities

  12. Play • Playing pranks • Actors: hackers/crackers/phreakers • Motivation: challenge, knowledge, thrill • Culture: social/educational • “global networks” • publications • forums • Law • DHS, Cybersecurity Laws & Regulations, http://www.dhs.gov/cybersecurity-laws-regulations

  13. Crime • Intellectual Property Crimes • IT targets: research and development, manufacturing and marketing plan, customer list, etc. • 1996: Economic Espionage Act (U.S. Congress) + amendments • Fraud • Telemarketing scam, identity theft, bank fraud, telecommunication fraud, computer fraud and abuse • Fighting crime • P. Roberts, U.S. Congress Hears Of Growing Cyber Espionage Threat To U.S., 06/29. 2012, http://threatpost.com/en_us/blogs/us-congress-hears-growing-cyber-espionage-threat-us-062912

  14. Crime • Actors: • Employees • Temporary staff • Vendors • Suppliers • Consultants • Trade secrets • Identity theft • Law

  15. Individual Rights • Privacy • Secondary use of information • Free speech • Harmful/disturbing speech • Theft and distribution of intellectual property • Censorship • E. Moyer, In Swartz protest, Anon hacks U.S. site, threatens leaks, 01/28/2013, http://news.cnet.com/8301-1009_3-57566016-83/in-swartz-protest-anon-hacks-u.s-site-threatens-leaks/

  16. National Security • Foreign Intelligence • Peace time: protecting national interests • Open channels, human spies, electronic surveillance, electronic hacking (?) • War time: support military operations • U.S. Intelligence Priorities: • Intelligence supporting military needs during operation • Intelligence about hostile countries • Intelligence about specific transnational threats • Central Intelligence Agency (CIA) • Primary targets in USA: high technology and defense-related industry

  17. War and Military Conflict • IT support, e.g., sensors, weapons, surveillance, etc. • Psyops and perception management • Physical weapons (?) • Cyber space battle (?) • Unmanned devices (?)

  18. Terrorism • Traditional: • Intelligence collection • Psyops and perception management • New forms: • Exploitation of computer technologies • Internet propaganda • Cyber attacks (electronic mail flooding, DOS, etc.) • Protection of national infrastructure

  19. Awareness Insider threat Remote access – authentication Counterfeit hardware Abuse of security guidelines

  20. Origin of Attacks • Vulnerable computers • Dependence on computers • Education of users • Economy • Monopoly of OS • Non-state actors

More Related