Understanding the Threats of and Defenses Against Cyber Warfare

Slides:



Advertisements
Similar presentations
1 Protecting the Long Island Business Community A Public Safety Partnership.
Advertisements

CUBIC DEFENSE APPLICATIONS Security Summit Discussions Jeff Snyder Vice President, Cyber Programs Cubic Defense Applications.
DoD and Cyber-Terrorism Eric Fritch CPSC 620. What is cyber-terrorism? "The premeditated, politically motivated attack against information, computer systems,
Addressing Terrorist Use of the Internet, Cyber Crime and Other Threats: National Expert Workshop Forging a Comprehensive Approach to Cyber Security Richard.
Computer Security Fundamentals
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Lachlan MacKinnon, Liz Bacon, Diane Gan, Georgios Loukas, David Chadwick, Dimitrios Frangiskatos Chapter 20.
INTERNATIONAL SECURITY AND PEACE WAR FOR THE NEW WORLD ORDER AND WAR ON TERRORISM Arifah Raja Falency (I34014)
Homeland Security. Learning Topics Purpose Introduction History Homeland Security Act Homeland Defense Terrorism Advisory System Keeping yourself safe.
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Paul de Souza Chapter 18 - National Cyber Defense Strategy, Pg. 224.
World Studies.  Any large scale, violent conflict.  Usually between large, trained armies with advanced weapons  War can also mean a struggle against.
Chapter 6 – Computer Viruses/Hacking and Prevention Starter Task – How can a virus effect your computer? Last Lesson: - Software Copyright & illegal Downloads.
Force Protection. What is Force Protection? Force protection (FP) is a term used by the US military to describe preventive measures taken to mitigate.
PACIFIC RIM SECURITY CONFERENCE CYBERATTACK: A NEW STRATEGIC WEAPON David Elliott February 24, 2010.
Homeland Security. Hey, It’s Me! I’m Tek – your i-SAFE guide. I’m a part of i-SAFE America. i-SAFE is concerned with teaching you how to be safe online.
InfraGard A Government and Private Sector Alliance Information sharing begins with human relationships – people talking with people whom they trust. Information.
Understanding the Threats of and Defenses Against Cyber Warfare.
SECR 5140-FL Critical Infrastructure Protection Dr. Barry S. Hess Spring 2 Semester Week 2: 25 March 2006.
Team Exercise. 5/29/2007SE Survival Exercise2 SURVIVAL!
Women In combat Samantha Tagle English 1010 I.E.P.
Lecture 19 Page 1 CS 236 Online Prolog to Lecture 19 CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
BY: AUSTIN NEIGH. WHAT IS CYBER WARFARE? Hacking that is politically motivated to conduct sabotage or espionage Form of information warfare Typically.
Colonel Chaipun Nilvises Deputy Director, Office of ASEAN Affairs Office of Policy and Planning Ministry of Defence of Thailand.
SEC 470 Entire Course (UOP) For more course tutorials visit  SEC 470 Week 1 US Patriot Act Paper  SEC 470 Week 2 Federal Agencies.
NANDHA ENGINEERING COLLEGE ERODE-52. CYBER WAR-A NEW FACE OF TERRORISM Guided byGuided by E.Kanimozhi,M.EE.Kanimozhi,M.E AP/Dept of ITAP/Dept of IT PRESENTED.
The Task You will be a political candidate for public office. Name your political party, design/choose your symbol, and create your slog a n. You will.
Peace and Conflict Causes and Consequences 9/11. LEARNING OBJECTIVES  To be able to explain to another student, your ideas of the causes of the 9/11.
The value of Cyber Defense Exercises 1. Purpose and objectives The aim is to improve information assurance in critical infrastructure by :  Better understanding.
Risks and Hazards to Consider Unit 3. Visual 3.1 Unit 3 Overview This unit describes:  The importance of identifying and analyzing possible hazards that.
Dr. Maria Chr. Alvanou Criminologist-Terrorism Expert Rome 20/10/2016
Presented by Miss Levine
Current Event Brief!.
Cybersecurity, competence and preparedness
Cyber Security Policy Analysts
From Belgium to the Trenches…
Department of the Army.
CZECH – GERMAN YOUNG PROFESSIONAL PROGRAM
Ice-breaker If you were fruit or vegetables, what would you like to be? Why?
CJA 454 Possible Is Everything/snaptutorial.com
PSY 360 ASSIST Lessons in Excellence-- psy360assist.com.
CJA 454 Teaching Effectively-- snaptutorial.com
CMGT 441 Teaching Effectively-- snaptutorial.com
MKT 438 Teaching Effectively-- snaptutorial.com
Combining the best of Audit and Penetration Testing
Teaching with Instructional Software
Warm Up – Wednesday In the warm up section of your notebook:
Career Preparation Learning Objectives:
Unit 3 Physical well-being Lesson 1: Basics of first aid 45 min
Computers and Homeland Security
Points of information.
Bell Work- page 102 Have you ever been bullied, cyber-bullied and/or harassed? Explain. If not, do you know someone who has? Explain. What are two ways.
Violence and Injury Prevention
LE1-C1S1T1pg1-6 Leadership Defined
Service Project Welcome Greet students and welcome them back.
Unit 9: The 1950’s & the Cold War
Presented by: The Young Leader’s Council (YLC)
Ref: A-CR-CCP-804/ PG-001 Capt Phinney
What IS ?.
Academic Alliance Initiative
Comparison to existing state of security experimentation
Training at the Awareness Level Review
5/6/2019 Information Warfare Trends, Dangers, and the Impact for European Research Policy Dipl. Pol. Ralf Bendrath, Berlin FoG:IS ReG:IS Forschungsgruppe.
Cooperate or compete? Name:.
Biology in the News.
Video Notes Organizer What did I learn today?.
Ethics and Moral Dilemmas
Deborah Housen-Couriel, ADV.
Challenges Of Network Security
ROMANS PART 3 – Julius Caesar 6 min video of Julius Caesar.
Lesson 3.2 Product Planning
Fallen Angels Personal Response.
Presentation transcript:

Understanding the Threats of and Defenses Against Cyber Warfare War Games

Definitions Cyber warfare: Cyber terrorism: Various aspects of defensing & attacking information & computer networks in cyberspace, as well as denying an adversary’s ability to do the same Cyber terrorism: Terrorists disrupt the Internet or critical infrastructures such as transportation, communications, or banking & finance using computer networks

At West Point, Training for Cyber Foes 1. How has military training for war games changed over time? http://www.nytimes.com/video/technology/1194840004076/at-west-point-training-for-cyber-foes.html (3 min) Watch the TED Talk at https://www.ted.com/talks/chris_domas_the_1s_and_0s_behind_cyber_warfare?language=en (16 min.) 2. According to Chris Domas, why is cyber such a concern? List several examples 3. Why is cyber defense so difficult? 4. Discuss the sequences of events Domas uses when approaching a situation. 5. List one unanswered question you have about this topic

60 minutes video clip 6. In your opinion, is the F-35 worth it? Explain https://www.youtube.com/watch?v=CkdDuleXZUg

War Games You will be divided into 2 groups. The red team should assume the role of the “attackers,” who will come up with a list of types of cyber attacks to be tried against the U.S. and/or other nations The green team is the “defense team,” a think tank charged with brainstorming approaches & ideas for defending & protecting the nation against cyber warfare. *Think strategically

Discuss 7. To what extent do the lists “match”? Was the green team able to anticipate all of the attacks that the red team generated? 8. Did the red team miss any opportunities? Explain 9. In what ways was this exercise difficult? 10. If in the military, would you rather be in the cyber defense unit or the general combat unit? Why? 11. Does fighting via cyber make killing easier? More like a video game? Defend your answer 12. In what ways could fighting via drone and/or cyber be more efficient?

Reading Questions 1. What do the cyber war games at West Point and other military training facilities tell us about the threat of cyber attacks? What danger do they pose?  2. What are the roles and responsibilities of the technology-trained cadets in the military?  3. What examples does the article provide of how cadets use their training in the field to prevent cyber attacks?  4. What does this article teach you about how cyber attacks occur and how they can be prevented?  5. In your opinion, is the U.S. well-prepared to ward off or fight cyber attacks? How can it become stronger in this area?