Download presentation
Presentation is loading. Please wait.
Published byHoratio Owen Modified over 9 years ago
1
Information Warfare Playgrounds to Battlegrounds
2
CSCE 727 - Farkas2 Last Class: Theory of IW Information resources Players Offensive operations Defensive operations WIN-LOSE NATURE OF OPERATIONS
3
Security Objectives Confidentiality Integrity Availability CSCE 727 - Farkas3
4
4 Offense Increase availability of resource for the offense Decrease integrity of resource for the defense Decrease availability of resource for defense
5
CSCE 727 - Farkas5 Defense Prevent availability of resource for offense Ensure integrity of resource for the defense Ensure availability of resource for the defense
6
CSCE 727 - Farkas6 Offense: Increased availability Collection of secret: – Espionage (illegal) and intelligence (may be legal) Piracy Penetration (hacking) Superimposition fraud (use by the offense on the defense’s legitimate usage) Identity theft Perception management (affect beliefs and behavior)
7
CSCE 727 - Farkas7 Offense: Decrease Availability for Defense Physical theft Sabotage Censorship
8
CSCE 727 - Farkas8 Offense: Decreased Integrity Tampering Penetration – Cover up – Virus, worm, malicious code Perception management – Fabrication, forgeries, fraud, identity theft, social engineering
9
CSCE 727 - Farkas9 Defense Prevention: keeps attacks from occurring Deterrence: makes attack unattractive Indications and warning: recognize attacks before it occurs Detection: recognize attacks Emergency preparedness: capability to recover from and response to attacks Response: actions taken after the attack
10
Playgrounds to Battlegrounds
11
CSCE 727 - Farkas11 IW Activities Context of human actions and conflict Domains: – Play: hackers vs. owners – Crime: perpetrators vs. victims – Individual rights: individuals vs. individuals/organizations/government – National security: national level activities
12
CSCE 727 - Farkas12 Play Playing pranks Actors: hackers/crackers/phreakers Motivation: challenge, knowledge, thrill Culture: social/educational – “global networks” – publications – forums Law – DHS, Cybersecurity Laws & Regulations, http://www.dhs.gov/cybersecurity-laws-regulations http://www.dhs.gov/cybersecurity-laws-regulations
13
CSCE 727 - Farkas13 Crime Intellectual Property Crimes – IT targets: research and development, manufacturing and marketing plan, customer list, etc. – 1996: Economic Espionage Act (U.S. Congress) + amendments Fraud – Telemarketing scam, identity theft, bank fraud, telecommunication fraud, computer fraud and abuse Fighting crime P. Roberts, U.S. Congress Hears Of Growing Cyber Espionage Threat To U.S., 06/29. 2012, http://threatpost.com/en_us/blogs/us-congress-hears- growing-cyber-espionage-threat-us-062912http://threatpost.com/en_us/blogs/us-congress-hears- growing-cyber-espionage-threat-us-062912
14
CSCE 727 - Farkas14 Crime Actors: – Employees – Temp. staff – Vendors – Suppliers – Consultants Trade secrets Identity theft Law
15
CSCE 727 - Farkas15 Individual Rights Privacy – Secondary use of information Free speech – Harmful/disturbing speech – Theft and distribution of intellectual property – Censorship E. Moyer, In Swartz protest, Anon hacks U.S. site, threatens leaks, 01/28/2013, http://news.cnet.com/8301- 1009_3-57566016-83/in-swartz-protest-anon-hacks-u.s- site-threatens-leaks/http://news.cnet.com/8301- 1009_3-57566016-83/in-swartz-protest-anon-hacks-u.s- site-threatens-leaks/
16
CSCE 727 - Farkas16 National Security Foreign Intelligence – Peace time: protecting national interests Open channels, human spies, electronic surveillance, electronic hacking (?) – War time: support military operations – U.S. Intelligence Priorities: Intelligence supporting military needs during operation Intelligence about hostile countries Intelligence about specific transnational threats – Central Intelligence Agency (CIA) – Primary targets in USA: high technology and defense- related industry
17
CSCE 727 - Farkas17 War and Military Conflict IT support, e.g., sensors, weapons, surveillance, etc. Psyops and perception management Physical weapons (?) Cyber space battle (?) Unmanned devices (?)
18
CSCE 727 - Farkas18 Terrorism Traditional: – Intelligence collection – Psyops and perception management New forms: – Exploitation of computer technologies Internet propaganda Cyber attacks (electronic mail flooding, DOS, etc.) Protection of national infrastructure
19
Awareness Insider threat Remote access – authentication Counterfeit hardware Abuse of security guidelines CSCE 727 - Farkas19
20
Origin of Attacks Vulnerable computers – Dependence on computers – Education of users – Economy – Monopoly of OS Non-state actors CSCE 727 - Farkas20
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.