Information Warfare - 11 Introduction and Preparing for Attacks.

Slides:



Advertisements
Similar presentations
Air Force Core Functions
Advertisements

Topic 10 Intro to IO Enabling Objectives 10.1 STATE the definition of Information Operations (IO) LIST five (5) Core Information Operations capabilities.
EFFECTIVE PARENT- TEACHER CONFERENCES Educational Service Center, North Parent and Community Engagement
CHAPTER 5 ANCIENT CHINA. FIRST LIFE Homo sapiens ◦ 100,000 years – Africa ◦ 50,000 – China ◦ Fire ◦ Small populations.
Introduction to Information Operations Attaché Corps- SEP 09
Mark of the digital theatre of war DrSci. György Seres.
In regards to Henry V by Shakespeare.  English troops marching toward Calais on the northern coast  French troops stop them in a field between the woods.
Honeypot 서울과학기술대학교 Jeilyn Molina Honeypot is the software or set of computers that are intended to attract attackers, pretending to be weak.
Previous Slide TRADOC DCSINT Office of the Deputy Chief of Staff for Intelligence U.S. Army Training and Doctrine Command TRADOC DCSINT.
TROOP LEADING PROCEDURES FM 7-8
Module 3 Chess 101 Strategy Strategy refers to an overall plan to achieve a goal In every game you play your goal should be to checkmate your opponent,
Core Principles Related to Conduct of Hostilities ATHA Specialized Training on International Humanitarian Law May 31, 2010 Stockholm, Sweden.
Tactics 101. Military tactics (the art of organizing an army) are the techniques for using weapons or military units in combination for engaging and defeating.
The American Military Experience The Principles of War Wayne E. Sirmon, M.A.Ed., M.A. Military Science & History Departments University of South Alabama.
Clausewitz VS Sun Tzu Nasim Ibrahim i Clausewitz and Sun Tzu -Prussia and China vs 2000 years ago - war is the main concept for both of them.
THE ARTS OF DEATH STRATEGIES OF THE CIVIL WAR. FOCUS QUESTION What do teams need to do in order to win a game?
Information Warfare - 11 Introduction and Preparing for Attacks.
ISMT 200g (Feb 6, 2007 Lecture): “The Art of War” in Business Dr. Theodore H. K. Clark Associate Professor and Academic Director of MSc in IS Management.
1 Air and Space Power Defined. 2 Overview  Define Air and Space Power  Competencies  Functions of Air and Space Power  Air and Space Doctrine  Principles.
© 2004 Carnegie Mellon UniversityIW-Strategy: 1 Strategy.
NATURE OF WAR Major Carlos Rascon.
The Five DYSFUNCTIONS of TEAM. What makes a team? Collaboration Commitment Trust Conflict Accountability Results.
Naval Weapons Systems Introduction to Naval Weapons.
Introduction (Based on Lecture slides by J. H. Wang)
Your role in supporting and influencing corporate strategy 13 May 2008 Presented by John DiNatale.
Overview Understand the evolution and change to American aviation strategy between Vietnam and Operation Desert Storm Know how military aviation and national.
Operational Security PCC. VII-F.1.
CSCE 727 Information Warfare
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Paul de Souza Chapter 18 - National Cyber Defense Strategy, Pg. 224.
Introduction to Military History. What is War? How do we define war? What distinguishes it from other forms of armed conflict?
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
Battle Drills Break Contact React to Ambush React to Contact
THE BRITISH APPROACH TO OPERATIONAL ART Lt Col David Broadfoot MBE The Highlanders Chief Instructor JSOC.
TSP VG 1 The Principles of War “The nine principles of war provide general guidance for the conduct of war....They are the enduring bedrock.
1 Strategy. 2 Deception “ All warfare is based on deception. Hence, when able to attack, we must seem unable; when using our forces, we must seem inactive;
ANCIENT CHINA. SHANG City-states Warfare Writing ◦ Pictures.
To Protect What Matters!! Protection Against Computer Virus Unit portfolio presentation by Saira Imtiaz.
MILITARY STRATEGY Part 1. Military strategy is a collective name for planning the conduct of warfare. Derived from the Greek strategos, strategy was seen.
C4ISR and Information Warfare Naval Weapons Systems.
IW-Strategy: 1 Strategy. IW-Strategy: 2 Deception “ All warfare is based on deception. Hence, when able to attack, we must seem unable; when using our.
THE ROLE AND USE OF MILITARY HISTORY. Integrate Historical Awareness and Critical Thinking Skills Derived from Military History Methodologies into the.
Principles of War and Tenets of Air Power
Un-Deceived James 1: Beware Deceit John 8:44 “[The devil] was a murderer from the beginning, and does not stand in the truth because there is no.
Ground Combat Support. Training & Logistics Support.
1 Introduction and Definitions. 2 Purpose of the Course This course is designed to provide students with hands on experience on identifying places where.
Understanding the Threats of and Defenses Against Cyber Warfare.
Reconnaissance and Surveillance Leader Course OPFOR TTP.
Sara Hsu.  History of Globalization: A parable  Study the past if you would define the future. -- Confucius  If your enemy is secure at all points,
U.S. ARMY 4632A21 Information Operations and Public Affairs 1 3/1/2007 BNCOC PA Supervisor Course Information Operations.
SEMINAR FOXTROT Group 2 LTC RUFFY LTC MAGALLANES LTC DE SAGON LTC MERCADO LTC GRAYDA CDR RUIZ LTC CANDELARIO LTC LIMET CARL VON CLAUSEWITZ.
Defense Policy Making You may not be interested in war, but war is interested in you.
Scripture Reading 2 Cor. 2:11. Introduction  We continue to look at some of the Satan’s devices.  Our aim is to be able to know what tactics our enemy.
Web Security Introduction to Ethical Hacking, Ethics, and Legality.
Operations Overview The levels of war are doctrinal perspectives that clarify the links between strategic objectives and tactical actions.
Execution and Implementation
The Devil Do You Believe That He Exists?. Our Adversary Defined as “an opponent; an enemy.” “Be sober, be vigilant; because your adversary the devil walks.
Copyright © Pearson Education Limited 2015 STRATEGIC MANAGEMENT ESSENTIALS 1-1 Chapter One.
CHARACTERISTICS OF THE OFFENSE Surprise Concentration Tempo Audacity FM 3-0 pg 7-4.
1. Objective 2. Offensive 3. Mass 4. Economy of Force 5. Maneuver 6. Unity of Command 7. Security 8. Surprise 9. Simplicity.
Sun Tzu. Introduction Sun Tzu was a military strategist best known for his masterpiece, The Art of War. The Art of War was praised by past and current.
Employment Considerations: Considerations at the Outset of Combat
UNCLASSIFIED 6/24/2016 8:12:34 PM Szymanski UNCLASSIFIED Page 1 of 15 Pages Space Policy Issues - Space Principles of War - 14 June, 2010.
Understanding the Threats of and Defenses Against Cyber Warfare
Tangled Web: Using Deception in Defense
THE ART OF WAR.
COSC 316: Host Computer Security
Game Planning If you know the enemy and know yourself, you need not fear the result of a hundred battles. If you know yourself but not the enemy, for every.
Operations Security (OPSEC)
Summary of Warfare to Date
God is Good James 1:16-20.
Presentation transcript:

Information Warfare - 11 Introduction and Preparing for Attacks

Information Warfare - 12 Purpose of the Course This course is concerned with strategy and tactics as applied to the defense of information. The focus of the course is defending computer networks and hosts against attack, including both recognition and response to attacks.

Information Warfare - 13 Texts Know Your Enemy, Honeynet Project (Enemy) The Art of War, Sun Tzu (Griffith Translation), or use text from Internet: (Sun)

Information Warfare - 14 Grading 20% (each) two graded homeworks 60% Final Paper (Topic related to Information Warfare, Submit paragraph-length proposal by 4/20) Joint work to understand allowed Work for submission is to be individual unless otherwise approved

Information Warfare - 15 Preparing for Conflict Sun Tzu said: The art of war is of vital importance to the State. It is a matter of life and death, a road either to safety or to ruin. Hence it is a subject of inquiry which can on no account be neglected. Why information warfare?

Information Warfare - 16 Information Warfare “Information warfare is the offensive and defensive use of information and information systems to deny, exploit, corrupt, or destroy, an adversary's information, information-based processes, information systems, and computer-based networks while protecting one's own. Such actions are designed to achieve advantages over military or business adversaries.” Dr. Ivan Goldberg

Information Warfare - 17 The Theory: Models C2 / Counter C2 Five Pillars ObserveAct Plan Evaluate ConcealFrustrate Misdirect Confuse Security DeceptionDestructionPsychological Warfare Command and Control

Information Warfare - 18 Aspects of Conflict Moral Law Heaven Earth Commander Method and Discipline

Information Warfare - 19 Moral Law Tau Morale or Purpose Attractiveness or Charisma of Leaders or of Purpose

Information Warfare Heaven Times and Seasons Occasion Weather Pacing and Scheduling of attack

Information Warfare Earth The battlefield The network –Services –Defenses –Users/Clients –Defenders/Administrators

Information Warfare Commander Personality Skills Preparation Motivation Reward

Information Warfare Method and Discipline Tools Procedures / Strategy Care in application / Reserves Preparation Assessment Follow-up

Information Warfare Circumstances Attack-aiding circumstances –Defender inattention –Window of vulnerability –Instability Attack-inhibiting circumstances –Instability –Defender focus –Distraction

Information Warfare Examples of Information Warfare Zapatista Information Strike India/Pakistan Kashmir Cyber Conflict Stuxnet device-control Strike Copyright infringement legal maneuvers Phishing / Sting operations

Information Warfare Deception “ All warfare is based on deception. Hence, when able to attack, we must seem unable; when using our forces, we must seem inactive; when we are near, we must make the enemy believe we are far away; when far away, we must make him believe we are near.”

Information Warfare Deception in Information Warfare Concealing intent of attack Concealing extent of attack Concealing methods of attack Concealing methods of defense Concealing objects of attack

Information Warfare Facing the Enemy “Hold out baits to entice the enemy. Feign disorder and crush him. If he is secure at all points, be prepared for him. If he is in superior strength, avoid him. If you opponent is of choleric temper, seek to irritate him. Pretend to be weak, that he may grow arrogant. If he is taking his ease, give him no rest. If his forces are united, separate them. Attack him where he is unprepared, appear where you are not expected. These military devices, leading to victory, must not be divulged beforehand.”