200 likes | 222 Views
Information Warfare Playgrounds to Battlegrounds. Last Class: Theory of IW. Information resources Players Offensive operations Defensive operations. WIN-LOSE NATURE OF OPERATIONS. Security Objectives. Confidentiality Integrity Availability. Offense and Defense.
E N D
Last Class: Theory of IW • Information resources • Players • Offensive operations • Defensive operations WIN-LOSE NATURE OF OPERATIONS
Security Objectives Confidentiality Integrity Availability
Offense: Increased availability • Collection of secret: • Espionage (illegal) and intelligence(may be legal) • Piracy • Penetration (hacking) • Superimposition fraud (use by the offense on the defense’s legitimate usage) • Identity theft • Perception management (affect beliefs and behavior)
Offense: Decrease Availability for Defense • Physical theft • Sabotage • Censorship
Offense: Decreased Integrity • Tampering • Penetration • Cover up • Virus, worm, malicious code • Perception management • Fabrication, forgeries, fraud, identity theft, social engineering
Defense – What Not to do Closing The Barn Door After The Horse Is Gone From: http://blog.johnlund.com/2013/10/closing-barn-door-after-horse-is-gone.html
Defense • Emergency preparedness: capability to recover from and response to attacks • Prevention: keeps attacks from occurring • Deterrence: makes attack unattractive • Indications and warning: recognize attacks before it occurs • Detection: recognize attacks • Response: actions taken after the attack
IW Activities • Context of human actions and conflict • Domains: • Play: hackers vs. owners • Crime: perpetrators vs. victims • Individual rights: individuals vs. individuals/organizations/government • National security: national level activities
Play • Playing pranks • Actors: hackers/crackers/phreakers • Motivation: challenge, knowledge, thrill • Culture: social/educational • “global networks” • publications • forums • Law • DHS, Cybersecurity Laws & Regulations, http://www.dhs.gov/cybersecurity-laws-regulations
Crime • Intellectual Property Crimes • IT targets: research and development, manufacturing and marketing plan, customer list, etc. • 1996: Economic Espionage Act (U.S. Congress) + amendments • Fraud • Telemarketing scam, identity theft, bank fraud, telecommunication fraud, computer fraud and abuse • Fighting crime • P. Roberts, U.S. Congress Hears Of Growing Cyber Espionage Threat To U.S., 06/29. 2012, http://threatpost.com/en_us/blogs/us-congress-hears-growing-cyber-espionage-threat-us-062912
Crime • Actors: • Employees • Temporary staff • Vendors • Suppliers • Consultants • Trade secrets • Identity theft • Law
Individual Rights • Privacy • Secondary use of information • Free speech • Harmful/disturbing speech • Theft and distribution of intellectual property • Censorship • E. Moyer, In Swartz protest, Anon hacks U.S. site, threatens leaks, 01/28/2013, http://news.cnet.com/8301-1009_3-57566016-83/in-swartz-protest-anon-hacks-u.s-site-threatens-leaks/
National Security • Foreign Intelligence • Peace time: protecting national interests • Open channels, human spies, electronic surveillance, electronic hacking (?) • War time: support military operations • U.S. Intelligence Priorities: • Intelligence supporting military needs during operation • Intelligence about hostile countries • Intelligence about specific transnational threats • Central Intelligence Agency (CIA) • Primary targets in USA: high technology and defense-related industry
War and Military Conflict • IT support, e.g., sensors, weapons, surveillance, etc. • Psyops and perception management • Physical weapons (?) • Cyber space battle (?) • Unmanned devices (?)
Terrorism • Traditional: • Intelligence collection • Psyops and perception management • New forms: • Exploitation of computer technologies • Internet propaganda • Cyber attacks (electronic mail flooding, DOS, etc.) • Protection of national infrastructure
Awareness Insider threat Remote access – authentication Counterfeit hardware Abuse of security guidelines
Origin of Attacks • Vulnerable computers • Dependence on computers • Education of users • Economy • Monopoly of OS • Non-state actors