Information Warfare Theory of Information Warfare

Slides:



Advertisements
Similar presentations
Cyber Crime and Technology
Advertisements

Introduction and Overview of Digital Crime and Digital Terrorism
Lynn Ray ISO Towson University Strategic Planning for IT Security Copyright Lynn Ray, This work is the intellectual property rights of the author.
© 2006, Monash University, Australia CSE468 Information Conflict Lecturer: Dr Carlo Kopp, MIEEE, MAIAA, PEng Lecture 01 Introduction and Overview.
CSCE 201 Introduction to Information Security Fall 2010.
CORPORATE ESPIONAGE COUNTERMEASURES Daniel J. Benny, M.A., CPP, PCI, CCO, CLET Private Investigator & Security Consultant.
Brian Connett, LCDR, USN US NAVAL ACADEMY
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
Cyber Crime Game Players By Marharyta Abreu & Iwona Sornat.
Chapter 14 Crime and Justice in the New Millennium
Management’s Role in Information Security V.T. Raja, Ph.D., Oregon State University.
EXAMINING CYBER/COMPUTER LAW BUSINESS LAW. EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Chapter 10 Privacy and Security McGraw-Hill
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Reliability and Security. Security How big a problem is security? Perfect security is unattainable Security in the context of a socio- technical system.
IT Security Readings A summary of Management's Role in Information Security in a Cyber Economy and The Myth of Secure Computing.
CYBER CRIME AND SECURITY TRENDS
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
CS 1308 Computer Literacy and the Internet. How do we look at Social Issues?  Financial  Moral  Ethical  Legal.
Computer Crime and CyberCrime Why we need Computer Forensics.
Computer Science and Engineering 1 Csilla Farkas Associate Professor Center for Information Assurance Engineering Dept. of Computer Science and Engineering.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
Cybersecurity and the Department of Justice Vincent A. Citro, Assistant United States Attorney July 9-10, 2014 Unclassified – For Public Use.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #33 Information Warfare November 19, 2007.
Homeland Security. Learning Topics Purpose Introduction History Homeland Security Act Homeland Defense Terrorism Advisory System Keeping yourself safe.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Forensics Services September 10, 2007.
Legal and Ethical Issues in Computer Security
Offensive IW Open Sources. CSCE Farkas2 Reading List – Open Source Intelligence: Private Sector Capabilities to Support DoD Policy, Acquisitions,
SEMINAR ON CYBER CRIME PRESENTED BY: SUCHISMITA RATH 1 st sem, MCA Roll no: ITER,BBSR.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
CHAPTER 10 Technology Issues.
CYBER CRIME.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
Information Warfare Playgrounds to Battlegrounds.
Crime & Malpractice AS Module Heathcote Ch. 10.
1 Book Cover Here PART D THE INFLUENCE AND IMPACT OF TECHNOLOGY Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition Copyright ©
Cyber Security Nevada Businesses Overview June, 2014.
Information Warfare Midterm Overview. Lectures Covered Everything until (including) March 2 nd Reading: – All lecture slides – Denning book: Chapters.
Salary Possibilities Newly assigned Special Agents start at a yearly salary of $43,441, or also recognized as a GS-10, plus multiple other pay increases.
IT Strategy for Business © Oxford University Press 2008 All rights reserved Chapter 12 IT Security Strategies.
1 Book Cover Here SECTION III SPECIAL TOPICS Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition Copyright © 2014, Elsevier Inc.
Information Warfare Summary. Information Security Information Assurance Information Warfare Information Dominance.
Larry J. Siegel Valerie Bell University of Cincinnati, Cincinnati, OH Chapter Twelve Enterprise Crime: White-Collar Crime, Cyber.
CSCE 201 Open Source Information Privacy. CSCE Farkas2 Reading List Recommended reading: – Open Source Intelligence: Private Sector Capabilities.
CYBER CRIME AND SECURITY If we can defeat them sitting at home……who needs to fight with tanks and guns!!!! Presented By Lipsita Behera. B.Sc IST, 3 rd.
Hurdles in implementation of cyber security in India.
CSCE 548 Secure Software Development Security Operations.
Information Warfare Playgrounds to Battlegrounds.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
CONTROLLING INFORMATION SYSTEMS
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
© 2015 Cengage Learning Chapter 14 Today’s Challenges in Criminal Justice.
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
Chapter One Copyright © 2016 Thomas J. Holt. All rights reserved.
BY: AUSTIN NEIGH. WHAT IS CYBER WARFARE? Hacking that is politically motivated to conduct sabotage or espionage Form of information warfare Typically.
Cyber Security – Client View Peter Gibbons | Head of Cyber Security, Group Business Services Suppliers’ Summer Conference 15/07/2015.
Information Management System Ali Saeed Khan 29 th April, 2016.
Advanced System Security Dr. Wayne Summers Department of Computer Science Columbus State University
Cyber crime and security issues
Information Warfare Summary. Information Security Information Assurance Information Warfare Information Dominance.
MGMT 452 Corporate Social Responsibility
MODUS OPERANDI OF CYBER CRIME
Teri Takai EXECUTIVE DIRECTOR, CENTER FOR DIGITAL GOVERNMENT.
Chapter 13 Security and Ethical Challenges.
Forensic and Investigative Accounting
Strategic threat assessment
Role of US Security and Intelligence Agencies
Presentation transcript:

Information Warfare Theory of Information Warfare

Reading list This lecture Denning Chapters 2 Denning, D. E. Stuxnet: What Has Changed? Future Internet 2012, 4, 672-687. (.pdf) CSCE 727 - Farkas

Information Warfare: Only intentional attacks + offensive operations Information Security: “The protection of information against unauthorized disclosure, transfer, modification, or destruction, whether accidental or intentional.” (U.S. federal standards) Information assurance: Information security + defensive information warfare Information Warfare: Only intentional attacks + offensive operations CSCE 727 - Farkas

Information Dominance Information Dominance - a condition that results from the use of offensive and defensive information operations to build a comprehensive knowledge advantage at a time, place, and on decision issues critical to mission success – from the IW Site, http://www.iwar.org.uk/iwar/resources/info-dominance/issue-paper.htm CSCE 727 - Farkas

WIN-LOSE NATURE OF OPERATIONS Information Warfare Information resources Players Offensive operations Defensive operations WIN-LOSE NATURE OF OPERATIONS CSCE 727 - Farkas

Way of Thinking S. R. Covey: 7 Habits of Highly Effective People Habit 4: Think Win-Win Character-based code for human interaction and competition Win-lose  zero-sum game, competing for limited resources Win-win  the ultimate winner? How are these direction affecting our (cyber) future? CSCE 727 - Farkas

Value of Resources Exchange value Operational value Determined by market value Quantifiable Operational value Determined by the benefits that can be derived from using the resource May no be quantifiable May not be the same value for each player (offensive and defensive players) Actual (before) and potential (after) value Give examples! CSCE 727 - Farkas

Players Offense: motives, means, opportunity Defense: protection Insiders, hackers, criminals, corporations, government, terrorists Defense: protection Federal Bureau of Investigation U.S., Secret Service Department of Treasury Department of Defense National Institute of Standards and technology ROLE OF GOVERNMENT CSCE 727 - Farkas

Offensive Information Warfare Target: particular information resources – resources does not need to be owned or managed by the defense Objective: increase the value of the resource for the offense and decrease it for the defense Gain: financial, strategic, thrill, etc. Loss (defense): financial, tactical, strategic, reputation, human loss, etc. CSCE 727 - Farkas

Cost of Information Warfare Monetary expense Personal time Risk of getting caught Punishment Resources used Measuring cost of cyber attacks CSCE 727 - Farkas

Offense Increase availability of resource Decrease integrity of resource Decrease availability of resource for defense CSCE 727 - Farkas

Defense Prevent availability of resource for offense Ensure integrity Ensure availability CSCE 727 - Farkas

Offense: Increased availability Collection of secret: Espionage (illegal) and intelligence (may be legal) Piracy Penetration (hacking) Superimposition fraud Identity theft Perception management CSCE 727 - Farkas

Offense: Decrease Availability for Defense Physical theft Sabotage Censorship CSCE 727 - Farkas

Offense: Decreased Integrity Tampering Penetration Cover up Virus, worm, malicious code Perception management Fabrication, forgeries, fraud, identity theft, social engineering CSCE 727 - Farkas

Defense Prevention: keeps attacks from occurring Deterrence: makes attack unattractive Indications and warning: recognize attacks before it occurs Detection: recognize attacks Emergency preparedness: capability to recover from and response to attacks Response: actions taken after the attack CSCE 727 - Farkas

Playgrounds to Battlegrounds

IW Activities Context of human actions and conflict Domains: Play: hackers vs. owners Crime: perpetrators vs. victims Individual rights: individuals vs. individuals/organizations/government National security: national level activities CSCE 727 - Farkas

Play Playing pranks Actors: hackers/crackers/phreakers Motivation: challenge, knowledge, thrill Culture: social/educational “global networks” publications forums Law CSCE 727 - Farkas

Crime Intellectual Property Crimes Fraud Fighting crime IT targets: research and development, manufacturing and marketing plan, customer list, etc. Attacker: insiders, formal insiders 1996: Economic Espionage Act (U.S. Congress) Fraud Telemarketing scam, identity theft, bank fraud, telecommunication fraud, computer fraud and abuse Fighting crime CSCE 727 - Farkas

Crime Actors: Trade secrets Identity theft Law Employees Temp. staff Vendors Suppliers Consultants Trade secrets Identity theft Law CSCE 727 - Farkas

Individual Rights Privacy Free speech Secondary use of information Harmful/disturbing speech Theft and distribution of intellectual property Censorship CSCE 727 - Farkas

National Security Foreign Intelligence Peace time: protecting national interests Open channels, human spies, electronic surveillance, electronic hacking (?) War time: support military operations U.S. Intelligence Priorities: Intelligence supporting military needs during operation Intelligence about hostile countries Intelligence about specific transnational threats Central Intelligence Agency (CIA) Primary targets in U.S.A.: high technology and defense-related industry CSCE 727 - Farkas

War and Military Conflict IT support, e.g., sensors, weapons, surveillance, etc. Psyops and perception management Physical weapons (?) Cyber space battle (?) Unmanned devices (?) CSCE 727 - Farkas

Terrorism Traditional: New forms: Intelligence collection Psyops and perception management New forms: Exploitation of computer technologies Internet propaganda Cyber attacks (electronic mail flooding, DOS, etc.) Protection of national infrastructure CSCE 727 - Farkas

Project CSCE 727 - Farkas

Sample Projects Title: Mobile application security Title: Military Open Source Intelligence Title: Signal Security Title: Social Networking and Cyber Security Title: Peer-to-Peer File Sharing and Fair Use Title: Security for Unmanned Systems Title: (Semantic) Web Security Title: Electronic Distribution of Copyrighted Materials via Peer-to-Peer Anonymous Networks Title: Echelon Title: Deception Detection Data Origin Authentication Title: Surveillance System and Legal Evidence CSCE 727 - Farkas