Information Warfare - 11 Introduction and Preparing for Attacks.

Slides:



Advertisements
Similar presentations
Thai delegation Presentation at 4 th ARF seminar on Cyber-terrorism
Advertisements

James D. Brown Chief Engineer and Senior Fellow Information Resource Management L-3 Communications.
The Military Challenge of Cyber AOC Talk on Cyber, EW and IO Dr Gary Waters, 17 April 2012.
Topic 10 Intro to IO Enabling Objectives 10.1 STATE the definition of Information Operations (IO) LIST five (5) Core Information Operations capabilities.
InformationInWarfareIW-100 College of Aerospace Doctrine, Research, and Education.
Chapter 2 Digital Terrorism.
CHAPTER 5 ANCIENT CHINA. FIRST LIFE Homo sapiens ◦ 100,000 years – Africa ◦ 50,000 – China ◦ Fire ◦ Small populations.
Military Deception and Counter Deception IW-120 College of Aerospace Doctrine, Research, and Education.
Introduction to Information Operations Attaché Corps- SEP 09
Previous Slide TRADOC DCSINT Office of the Deputy Chief of Staff for Intelligence U.S. Army Training and Doctrine Command TRADOC DCSINT.
In regards to Henry V by Shakespeare.  English troops marching toward Calais on the northern coast  French troops stop them in a field between the woods.
© 2006, Monash University, Australia CSE468 Information Conflict Lecturer: Dr Carlo Kopp, MIEEE, MAIAA, PEng Lecture 01 Introduction and Overview.
Previous Slide TRADOC DCSINT Office of the Deputy Chief of Staff for Intelligence U.S. Army Training and Doctrine Command TRADOC DCSINT.
Australia and Cyber Warfare by Ian Dudgeon A presentation to the AIIA Queensland Branch 14 June 2011.
Tactics 101. Military tactics (the art of organizing an army) are the techniques for using weapons or military units in combination for engaging and defeating.
The American Military Experience The Principles of War Wayne E. Sirmon, M.A.Ed., M.A. Military Science & History Departments University of South Alabama.
Clausewitz VS Sun Tzu Nasim Ibrahim i Clausewitz and Sun Tzu -Prussia and China vs 2000 years ago - war is the main concept for both of them.
Information Warfare - 11 Introduction and Preparing for Attacks.
Information Warfare an Information Management Perspective JS Vorster & R P van Heerden Research Funding: DST, CSIR DPSS.
ISMT 200g (Feb 6, 2007 Lecture): “The Art of War” in Business Dr. Theodore H. K. Clark Associate Professor and Academic Director of MSc in IS Management.
Critical Infrastructure Protection (and Policy) H. Scott Matthews March 5, 2003.
© 2004 Carnegie Mellon UniversityIW-Strategy: 1 Strategy.
C4ISR and Information Warfare
The Art of War Sun Tzu Jett Klinzing 3/25/13 Period 11.
Defining some terms and ideas. Limited War : War which involves fighting only between professional armies on a clearly defined battlefield Minimal effect.
Naval Weapons Systems Introduction to Naval Weapons.
To Protect What Matters!! Protection Against Computer Virus Unit portfolio presentation by Saira Imtiaz.
CSCE 727 Strategic Information Warfare. National Security Issues Information Warfare - Farkas2 Interesting read: B. Baer Arnold, Cyber war in Ukraine.
Your role in supporting and influencing corporate strategy 13 May 2008 Presented by John DiNatale.
PREPAREDNESS AND RESPONSE TO CYBER THREATS REQUIRE A CSIRT By Jaco Robertson, Marthie Lessing and Simon Nare*
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #33 Information Warfare November 19, 2007.
Overview Understand the evolution and change to American aviation strategy between Vietnam and Operation Desert Storm Know how military aviation and national.
Operational Security PCC. VII-F.1.
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Paul de Souza Chapter 18 - National Cyber Defense Strategy, Pg. 224.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
Battle Drills Break Contact React to Ambush React to Contact
THE BRITISH APPROACH TO OPERATIONAL ART Lt Col David Broadfoot MBE The Highlanders Chief Instructor JSOC.
1 Strategy. 2 Deception “ All warfare is based on deception. Hence, when able to attack, we must seem unable; when using our forces, we must seem inactive;
ANCIENT CHINA. SHANG City-states Warfare Writing ◦ Pictures.
To Protect What Matters!! Protection Against Computer Virus Unit portfolio presentation by Saira Imtiaz.
MILITARY STRATEGY Part 1. Military strategy is a collective name for planning the conduct of warfare. Derived from the Greek strategos, strategy was seen.
Information Warfare Summary. Information Security Information Assurance Information Warfare Information Dominance.
C4ISR and Information Warfare Naval Weapons Systems.
1. 2 USAF CONOPS & AIR AND SPACE POWER REVIEW Chap 23 & 24.
IW-Strategy: 1 Strategy. IW-Strategy: 2 Deception “ All warfare is based on deception. Hence, when able to attack, we must seem unable; when using our.
THE ROLE AND USE OF MILITARY HISTORY. Integrate Historical Awareness and Critical Thinking Skills Derived from Military History Methodologies into the.
Un-Deceived James 1: Beware Deceit John 8:44 “[The devil] was a murderer from the beginning, and does not stand in the truth because there is no.
Unclassified  1 Critical Infrastructure Protection Chuck Whitley EMS User’s Group June 9, 1999.
1 Introduction and Definitions. 2 Purpose of the Course This course is designed to provide students with hands on experience on identifying places where.
Understanding the Threats of and Defenses Against Cyber Warfare.
1 Tactics and Penetration Testing. Overview Tactics: A procedure or set of maneuvers engaged in to achieve an end, an aim, or a goal. Tactics Penetration.
Sara Hsu.  History of Globalization: A parable  Study the past if you would define the future. -- Confucius  If your enemy is secure at all points,
U.S. ARMY 4632A21 Information Operations and Public Affairs 1 3/1/2007 BNCOC PA Supervisor Course Information Operations.
Previous Slide TRADOC DCSINT Office of the Deputy Chief of Staff for Intelligence U.S. Army Training and Doctrine Command TRADOC DCSINT.
Web Security Introduction to Ethical Hacking, Ethics, and Legality.
Execution and Implementation
Copyright © Pearson Education Limited 2015 STRATEGIC MANAGEMENT ESSENTIALS 1-1 Chapter One.
Sun Tzu. Introduction Sun Tzu was a military strategist best known for his masterpiece, The Art of War. The Art of War was praised by past and current.
Employment Considerations: Considerations at the Outset of Combat
UNCLASSIFIED 6/24/2016 8:12:34 PM Szymanski UNCLASSIFIED Page 1 of 15 Pages Space Policy Issues - Space Principles of War - 14 June, 2010.
Peace Support Training Centre / Centre de formation pour le soutien de la paix INTRO TO PSYOPS AIYJ PSTC Template designed by Maj McQueen.
Information Warfare Summary. Information Security Information Assurance Information Warfare Information Dominance.
International Security and Peace
Understanding the Threats of and Defenses Against Cyber Warfare
THE ART OF WAR.
COSC 316: Host Computer Security
Operations Security (OPSEC)
5/6/2019 Information Warfare Trends, Dangers, and the Impact for European Research Policy Dipl. Pol. Ralf Bendrath, Berlin FoG:IS ReG:IS Forschungsgruppe.
S&T Main Focus Areas Linkages to 2018 NDS
God is Good James 1:16-20.
Presentation transcript:

Information Warfare - 11 Introduction and Preparing for Attacks

Information Warfare - 12 Purpose of the Course This course is concerned with strategy and tactics as applied to the defense of information. The focus of the course is defending computer networks and hosts against attack, including both recognition and response to attacks.

Information Warfare - 13 Texts Know Your Enemy, Honeynet Project (Enemy) The Art of War, Sun Tzu (Griffith Translation), or use text from Internet: (Sun)

Information Warfare - 14 Grading 20% (each) two graded homeworks 60% Final Paper (Topic related to Information Warfare, Submit paragraph-length proposal by 3/21) Joint work to understand allowed Work for submission is to be individual unless otherwise approved

Information Warfare - 15 Preparing for Conflict Sun Tzu said: The art of war is of vital importance to the State. It is a matter of life and death, a road either to safety or to ruin. Hence it is a subject of inquiry which can on no account be neglected. Why information warfare?

Information Warfare - 16 Information Warfare “Information warfare is the offensive and defensive use of information and information systems to deny, exploit, corrupt, or destroy, an adversary's information, information-based processes, information systems, and computer-based networks while protecting one's own. Such actions are designed to achieve advantages over military or business adversaries.” Dr. Ivan Goldberg

Information Warfare - 17 Why look at Information Warfare? Most intruder activity is not information warfare –Cyber-vandalism –Cyber-crime Advanced intruders are becoming more commercial –Financial targets –Hack-for-hire –Hack-for-sales (e.g., spamming)

Information Warfare - 18 Why look at Information Warfare - 2 Advanced intruders are becoming more strategic –Deniability –Stealthy communication / exploit –Attack through intermediates Defense needs to be more strategic –Avoid time-consumptive response where possible –Avoid damage/costs –Avoid ceding the advantage to the intruder

Information Warfare - 19 Information Warfare is NOT New In one form or another IW as old as war Every great military writer discusses Old idea with new name How old is it?

Information Warfare As Old As War Itself Sun Tzu (4 th Century B.C.) Machiavelli (15 th Century) Jomini (19 th Century) Toffler (20 th Century)

Information Warfare The Theory: Models C2 / Counter C2 Five Pillars ObserveAct Plan Evaluate ConcealFrustrate Misdirect Confuse Security DeceptionDestructionPsychological Warfare Command and Control

Information Warfare What is the Value of IW? Degrades the enemy’s ability to wage war Enhances your ability to wage war Provides operational control Allows for superior intelligence and situational awareness

Information Warfare The Pillars - Security Intelligence gathering The more you know the better your strategy Protection of critical information Even seemingly innocent information can have value to the enemy Information Superiority a prime goal

Information Warfare The Pillars - Deception Concealing intent of attack Concealing extent of attack Concealing methods of attack Concealing methods of defense Concealing objects of attack

Information Warfare Deception “ All warfare is based on deception. Hence, when able to attack, we must seem unable; when using our forces, we must seem inactive; when we are near, we must make the enemy believe we are far away; when far away, we must make him believe we are near.” (Sun Tzu)

Information Warfare The Pillars - Destruction Elimination of communications Computer Network Attack Destruction of Information Infrastructure Goal is to create chaos Destruction almost always limited

Information Warfare The Pillars – Psychological Warfare PsyOps is perception management Not always propaganda Not always deceptive Not always used against the enemy Examples: Persian Gulf and Bosnia

Information Warfare The Pillars – Command and Control No army can win without it C2 provides direction and focus to armies Good C2 essential to morale and belief in leaders Always a major target

Information Warfare Sun Tzu’s Aspects of Conflict Moral Law Heaven Earth Commander Method and Discipline

Information Warfare Moral Law Tau Morale or Purpose Attractiveness or Charisma of Leaders or of Purpose

Information Warfare Heaven Times and Seasons Occasion Weather Pacing and Scheduling of attack

Information Warfare Earth The battlefield The network –Services –Defenses –Users/Clients –Defenders/Administrators

Information Warfare Commander Personality Skills Preparation Motivation Reward

Information Warfare Method and Discipline Tools Procedures / Strategy Care in application / Reserves Preparation Assessment Follow-up

Information Warfare Circumstances Attack-aiding circumstances –Defender inattention –Window of vulnerability –Instability Attack-inhibiting circumstances –Instability –Defender focus –Distraction

Information Warfare Examples of Information Warfare Zapatista Information Strike India/Pakistan Kashmir Cyber Conflict Some marketing pitches Copyright infringement legal maneuvers

Information Warfare Facing the Enemy “Hold out baits to entice the enemy. Feign disorder and crush him. If he is secure at all points, be prepared for him. If he is in superior strength, avoid him. If you opponent is of choleric temper, seek to irritate him. Pretend to be weak, that he may grow arrogant. If he is taking his ease, give him no rest. If his forces are united, separate them. Attack him where he is unprepared, appear where you are not expected. These military devices, leading to victory, must not be divulged beforehand.”

Information Warfare The Rest of the Course Strategy Technology implementation Insider threat Attackers and defenders Physical and Cyber attacks Future