Presentation is loading. Please wait.

Presentation is loading. Please wait.

Information Warfare Playgrounds to Battlegrounds.

Similar presentations


Presentation on theme: "Information Warfare Playgrounds to Battlegrounds."— Presentation transcript:

1 Information Warfare Playgrounds to Battlegrounds

2 CSCE 727 - Farkas2 Last Class: Theory of IW Information resources Players Offensive operations Defensive operations WIN-LOSE NATURE OF OPERATIONS

3 Security Objectives Confidentiality Integrity Availability CSCE 727 - Farkas3

4 4 Offense Increase availability of resource for the offense Decrease integrity of resource for the defense Decrease availability of resource for defense

5 CSCE 727 - Farkas5 Defense Prevent availability of resource for offense Ensure integrity of resource for the defense Ensure availability of resource for the defense

6 CSCE 727 - Farkas6 Offense: Increased availability Collection of secret: – Espionage (illegal) and intelligence (may be legal) Piracy Penetration (hacking) Superimposition fraud (use by the offense on the defense’s legitimate usage) Identity theft Perception management (affect beliefs and behavior)

7 CSCE 727 - Farkas7 Offense: Decrease Availability for Defense Physical theft Sabotage Censorship

8 CSCE 727 - Farkas8 Offense: Decreased Integrity Tampering Penetration – Cover up – Virus, worm, malicious code Perception management – Fabrication, forgeries, fraud, identity theft, social engineering

9 CSCE 727 - Farkas9 Defense Prevention: keeps attacks from occurring Deterrence: makes attack unattractive Indications and warning: recognize attacks before it occurs Detection: recognize attacks Emergency preparedness: capability to recover from and response to attacks Response: actions taken after the attack

10 Playgrounds to Battlegrounds

11 CSCE 727 - Farkas11 IW Activities Context of human actions and conflict Domains: – Play: hackers vs. owners – Crime: perpetrators vs. victims – Individual rights: individuals vs. individuals/organizations/government – National security: national level activities

12 CSCE 727 - Farkas12 Play Playing pranks Actors: hackers/crackers/phreakers Motivation: challenge, knowledge, thrill Culture: social/educational – “global networks” – publications – forums Law – DHS, Cybersecurity Laws & Regulations, http://www.dhs.gov/cybersecurity-laws-regulations http://www.dhs.gov/cybersecurity-laws-regulations

13 CSCE 727 - Farkas13 Crime Intellectual Property Crimes – IT targets: research and development, manufacturing and marketing plan, customer list, etc. – 1996: Economic Espionage Act (U.S. Congress) + amendments Fraud – Telemarketing scam, identity theft, bank fraud, telecommunication fraud, computer fraud and abuse Fighting crime P. Roberts, U.S. Congress Hears Of Growing Cyber Espionage Threat To U.S., 06/29. 2012, http://threatpost.com/en_us/blogs/us-congress-hears- growing-cyber-espionage-threat-us-062912http://threatpost.com/en_us/blogs/us-congress-hears- growing-cyber-espionage-threat-us-062912

14 CSCE 727 - Farkas14 Crime Actors: – Employees – Temp. staff – Vendors – Suppliers – Consultants Trade secrets Identity theft Law

15 CSCE 727 - Farkas15 Individual Rights Privacy – Secondary use of information Free speech – Harmful/disturbing speech – Theft and distribution of intellectual property – Censorship E. Moyer, In Swartz protest, Anon hacks U.S. site, threatens leaks, 01/28/2013, http://news.cnet.com/8301- 1009_3-57566016-83/in-swartz-protest-anon-hacks-u.s- site-threatens-leaks/http://news.cnet.com/8301- 1009_3-57566016-83/in-swartz-protest-anon-hacks-u.s- site-threatens-leaks/

16 CSCE 727 - Farkas16 National Security Foreign Intelligence – Peace time: protecting national interests Open channels, human spies, electronic surveillance, electronic hacking (?) – War time: support military operations – U.S. Intelligence Priorities: Intelligence supporting military needs during operation Intelligence about hostile countries Intelligence about specific transnational threats – Central Intelligence Agency (CIA) – Primary targets in USA: high technology and defense- related industry

17 CSCE 727 - Farkas17 War and Military Conflict IT support, e.g., sensors, weapons, surveillance, etc. Psyops and perception management Physical weapons (?) Cyber space battle (?) Unmanned devices (?)

18 CSCE 727 - Farkas18 Terrorism Traditional: – Intelligence collection – Psyops and perception management New forms: – Exploitation of computer technologies Internet propaganda Cyber attacks (electronic mail flooding, DOS, etc.) Protection of national infrastructure

19 Awareness Insider threat Remote access – authentication Counterfeit hardware Abuse of security guidelines CSCE 727 - Farkas19

20 Origin of Attacks Vulnerable computers – Dependence on computers – Education of users – Economy – Monopoly of OS Non-state actors CSCE 727 - Farkas20


Download ppt "Information Warfare Playgrounds to Battlegrounds."

Similar presentations


Ads by Google