600 likes | 1.22k Views
Review. Global Information Infrastructure Data NetworkWhat is ProtocolVoice NetworkCable NetworkInternet Benefits and Threats. Content. What is battlefield?Information Age BattlefieldInformation Warfare Tactics Process. Where is the battlefield?. In the agricultural age, battles were fought largely on land and sea.In agrarian societies, battlefields were largely limited to small areas at the front lines or specific targets such as port cities.In the industrial age, the enemy targeted i9459
E N D
4. Where is the battlefield? In the agricultural age, battles were fought largely on land and sea.
In agrarian societies, battlefields were largely limited to small areas at the front lines or specific targets such as port cities.
In the industrial age, the enemy targeted infrastructure, war making capabilities, and large cities.
In the information age, the battlefield is in some sense everywhere, but in another sense, more focused.
16. SYN Floods (DoS) The SYN command initiates a network connection. The SYN request is acknowledged and then the client acknowledges receipt of the acknowledgement (3 way handshake). TCP only supports a limited number of SYN requests. If too many fraudulent requests are sent, subsequent (and perhaps legitimate) requests are discarded.
17. Spoofing Spoofing usually involves modifying packet headers so that it appears messages are coming from a trusted source.
This can be one way to gain access to a system without account name or password and bypass a firewall.
Can be used in “man in the middle” attacks.
This is where a hacker sniffs a network connection and spoofs the IP address of one the end points and/or substitute his/her own encryption key
20. HTTP Commands GET
POST
HEAD
asks server to leave requested object out of response
PUT
uploads file in entity body to path specified in URL field
DELETE
deletes file specified in the URL field
21. Accessing HTTP server without a Browser Telnet to mason Web server
telnet www.gmu.edu 80
Opens TCP connection to port 80
Type in a GET command to request the class website
GET /~msherif/IT353/fall03/it353.html
Look at response message sent by HTTP server!
22. Forged Email Compromised accounts
Some mail systems will allow you to set the outgoing email address
Forge email headers (What is SMTP)
23. Accessing SMTP server The following syntax allow you to send email without using email client (reader)
telnet server name 25
see 220 reply from server
enter HELO, MAIL FROM, RCPT TO, DATA, QUIT commands
25. TEMPEST Transient Electromagnetic Pulse Surveillance Standard (acronym definition varies).
Computer systems emit electromagnetic radiation that can be detected and recorded by van Eck receptors (named after a Dutch scientist who wrote a landmark paper on the subject.)
TEMPEST technology is used to shield equipment and facilities to prevent such eavesdropping.
28. Social Engineering The term is thought to have been first used in Nazi Germany to describe means of controlling an entire population.
The term has been used in recent decades to describe using some form of non-technical deception or impersonation to violate security.
Social Engineering is a widely used hacker tool.
Examples
Student who send messages to AOL subscribers telling him that he was the SysAdmin and asking to verify their password and credit card numbers. (“Phishing”)
34. Steganography You can replace information in an image, which can be extracted with a key.
You can add information to a file.
Applications
Digital Watermarking
Secret Communication
Steganography Tools:
wbStego (html, pdf, text and bitmap files)
MP3Stego
StegFS (Linux)
Snow (uses white space at the end of lines)
DetectionTools:
Steganography Detection and Removal Toolkit (S-DART, USAF Research Lab)
Stegdetect
35. Digital Watermarking Digital Watermarks are used to identify ownership. For example, a graphic designer may hide a watermark in his/her graphics so that s/he can display them on the Internet without being afraid that they will be ripped off. (Or, if they are, s/he can sue for damages.)
Webcrawlers can be used to find infringements online.
Click on this link below to view this example Illustration
36. Honey Pots and Honey Nets A sort of false front end to your network that lures hackers into trying their tricks. (The real network is secured behind a firewall.) The Honey Pot (or Honey Net) detects and logs the illegal activity
Unfortunately, there are still many legal issues with this technology.
The Honey Pot has to be clever enough so that the hacker doesn’t become suspicious.
38. Disinformation Disinformation is the dissemination of false information in an attempt to mislead.
Sometimes the information is hidden in such a way that it is likely to be found, thus making it look credible.
In WWII, the British tricked the Germans into moving their forces by planting false documents on the body of a dead soldier.
During the recent war against Iraq, the Iraqi Information Minister repeatedly denied coalition victories. The US gave starkly different reports.
39. Disinformation (Cont.) While wartime propaganda is nothing new think about the level of trust one puts in:
Hearsay
Newspaper articles
Radio reports
TV reports
Internet reports
Which are you inclined to trust the most?
41. Fabrication Fabrication can be used as a tactic in Economic warfare
One could spread false rumors about disease outbreaks, false economic reports, false stories about assassinations or other events of national importance.
In recent months, there have been numerous reports of false news stories. With a large scale organization and sufficient funds, one could probably subvert a number of reporters.
Digital pictures, movies, and recordings can be edited to distort factual occurrences.
False rumors could be used to discredit a political figure.
55. Criminal Criminals are those that violate the law of society, and use hoaxes to gain sympathy and money
Nigerian Scam
Kidneys removed
Little Jessica dying of Cancer
For entertaining read urban legends, by visiting: http://urbanlegends.about.com/
57. Simula War We have said that in modern information warfare, destroying the enemy army is not necessarily an objective.
Some have taken this notion to the next level and have suggested that if the objective is to take control of power and infrastructure, then why fight a real battle at all? Why not simply run a simulation and agree to abide by the outcome? Wouldn’t this be more civilized? (See Star Trek OS Episode 23, A Taste of Armageddon.)
If you could prove to the enemy that it would lose, wouldn’t it make more sense not to fight at all?
58. War Gaming and Simulations Whatever you conclude about Simula War, certainly computer systems play an enormous role in preparing for engagement, training soldiers to use equipment, and strategic planning.
G2Interactive