Download presentation
Presentation is loading. Please wait.
Published byGarry Willis Modified over 9 years ago
1
Information Warfare - 11 Introduction and Preparing for Attacks
2
Information Warfare - 12 Purpose of the Course This course is concerned with strategy and tactics as applied to the defense of information. The focus of the course is defending computer networks and hosts against attack, including both recognition and response to attacks.
3
Information Warfare - 13 Texts Know Your Enemy, Honeynet Project (Enemy) The Art of War, Sun Tzu (Griffith Translation), or use text from Internet: http://classics.mit.edu/Tzu/artwar.1b.txt (Sun) http://classics.mit.edu/Tzu/artwar.1b.txt
4
Information Warfare - 14 Grading 20% (each) two graded homeworks 60% Final Paper (Topic related to Information Warfare, Submit paragraph-length proposal by 4/20) Joint work to understand allowed Work for submission is to be individual unless otherwise approved
5
Information Warfare - 15 Preparing for Conflict Sun Tzu said: The art of war is of vital importance to the State. It is a matter of life and death, a road either to safety or to ruin. Hence it is a subject of inquiry which can on no account be neglected. Why information warfare?
6
Information Warfare - 16 Information Warfare “Information warfare is the offensive and defensive use of information and information systems to deny, exploit, corrupt, or destroy, an adversary's information, information-based processes, information systems, and computer-based networks while protecting one's own. Such actions are designed to achieve advantages over military or business adversaries.” Dr. Ivan Goldberg
7
Information Warfare - 17 The Theory: Models C2 / Counter C2 Five Pillars ObserveAct Plan Evaluate ConcealFrustrate Misdirect Confuse Security DeceptionDestructionPsychological Warfare Command and Control
8
Information Warfare - 18 Aspects of Conflict Moral Law Heaven Earth Commander Method and Discipline
9
Information Warfare - 19 Moral Law Tau Morale or Purpose Attractiveness or Charisma of Leaders or of Purpose
10
Information Warfare - 110 Heaven Times and Seasons Occasion Weather Pacing and Scheduling of attack
11
Information Warfare - 111 Earth The battlefield The network –Services –Defenses –Users/Clients –Defenders/Administrators
12
Information Warfare - 112 Commander Personality Skills Preparation Motivation Reward
13
Information Warfare - 113 Method and Discipline Tools Procedures / Strategy Care in application / Reserves Preparation Assessment Follow-up
14
Information Warfare - 114 Circumstances Attack-aiding circumstances –Defender inattention –Window of vulnerability –Instability Attack-inhibiting circumstances –Instability –Defender focus –Distraction
15
Information Warfare - 115 Examples of Information Warfare Zapatista Information Strike India/Pakistan Kashmir Cyber Conflict Stuxnet device-control Strike Copyright infringement legal maneuvers Phishing / Sting operations
16
Information Warfare - 116 Deception “ All warfare is based on deception. Hence, when able to attack, we must seem unable; when using our forces, we must seem inactive; when we are near, we must make the enemy believe we are far away; when far away, we must make him believe we are near.”
17
Information Warfare - 117 Deception in Information Warfare Concealing intent of attack Concealing extent of attack Concealing methods of attack Concealing methods of defense Concealing objects of attack
18
Information Warfare - 118 Facing the Enemy “Hold out baits to entice the enemy. Feign disorder and crush him. If he is secure at all points, be prepared for him. If he is in superior strength, avoid him. If you opponent is of choleric temper, seek to irritate him. Pretend to be weak, that he may grow arrogant. If he is taking his ease, give him no rest. If his forces are united, separate them. Attack him where he is unprepared, appear where you are not expected. These military devices, leading to victory, must not be divulged beforehand.”
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.