We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byMarshall Franklin
Modified about 1 year ago
© 2006, Monash University, Australia CSE468 Information Conflict Lecturer: Dr Carlo Kopp, MIEEE, MAIAA, PEng Lecture 01 Introduction and Overview
© 2006, Monash University, Australia Reference Sources and Bibliography NOTE: There are a limited number of publications available in this area. Dorothy E. Denning, Information Warfare and Security, ACM Press (Addison-Wesley), 1999, ISBN 0-201-43303-6. Winn Schwartau, Information Warfare: Cyberterrorism : Protecting Your Personal Security in the Electronic Age, New York, NY: Thunder's Mouth Press, 1995, Second Edition. Carlo Kopp’s publications at http://www.ausairpower.net/iw.html http://www.ausairpower.net/iw.html In addition, selected research papers will be referenced and discussed throughout the topic.
© 2006, Monash University, Australia Overview – Lecture Topics Shannon's information theory concepts, basic game theory concepts. Four canonical strategies of information conflict vs Shannon's information theory. Compound information conflict strategies and using graphs to model these. Hypergames vs information conflict strategies. Evolutionary nature of information conflict and biological examples. Analysis and modelling of information conflict attacks and techniques. Forms of information conflict, Class I, II, III, IV information warfare, denial of service attack classification. Information conflict vs copyright, privacy, spam, espionage, surveillance, perception management, propaganda, advertising, hacking and cyberwar, viruses/worms, and identity theft. Information conflict vs basic concepts and risks in computer security and encryption. Problems arising in law enforcement and organisational security due to the proliferation of information conflict techniques.
© 2006, Monash University, Australia What is Information Conflict? Information Conflict is a more generalised term used to describe what most of the literature calls ‘Information Warfare’, ‘InfoWar’ or ‘IW’. Contrary to the common misconception, IW is more than the study of hackers, info-terrorists, applied cryptography, espionage and electromagnetic weapons. IW in the broadest sense is the study of how information is exploited or protected in survival contests. The ‘exploitation’ aspect is centred on how the use or manipulation of information can be utilised to an advantage. The ‘protection’ aspect is centred on how to prevent an opponent from using or manipulating information to an advantage.
© 2006, Monash University, Australia Definition – Social Context United States Department of Defense: ‘Information Warfare is any action to Deny, Exploit, Corrupt or Destroy the enemy’s information and its functions; protecting ourselves against those actions and exploiting our own military information functions’. This definition describes Information Warfare in terms of ‘actions’ executed to achieve a sought outcome - denial, exploitation, corruption and destruction of an opponent’s ‘information’ and related functions, and prevention of such ‘actions’ executed by an opponent. This is the most widely used formal definition of what IW is and what it most fundamental aspects are. The definition is incomplete and it limitations will be discussed further.
© 2006, Monash University, Australia Definition – Scientific Context Kopp and Mills (2002): Information Warfare is an evolved survival aid in the biological domain … The argument by evolutionary theorists is that features in a species which improve its probability of individual survival and reproduction will be propagated, at the expense of features which impair individual survival and reproduction. Hypothesis demonstrated by showing: 1. The species employs one or more than one of the four canonical IW strategies to aid in its survival. 2. Multiple species which are not closely related, and preferably exist in diverse environments, employ the same subset of the four canonical strategies to aid in their survival. 3. Closely related species exist to the examples found, which do not employ any of the four canonical strategies to aid in their survival.
© 2006, Monash University, Australia Shannon's Information Theory Concepts What is ‘information’? Information vs data? The role of the observer? Shannon’s channel capacity theorem Shannon’s concept of entropy How Shannon applies to real world problems Examples
© 2006, Monash University, Australia Basic Game Theory Concepts What is game theory? What is a player? Von Neumann and evolution of game theory Berne’s psychological game concept Metagames – hypergames Higher order hypergames Ordinal vs cardinal games Examples - Prisoner’s dilemma game Examples - The ‘Chicken’ game
© 2006, Monash University, Australia Four Canonical Strategies of IW Why a fundamental theory? Defining the four strategies: 1. Denial of Information / Degradation or Destruction 2. Deception and Mimicry / Corruption 3. Disruption and Destruction / Denial  4. Subversion / Denial  Shannon vs the four canonical strategies Orthogonality properties of the canonical strategies Examples of the four canonical strategies
© 2006, Monash University, Australia Compound Information Conflict Strategies What is a simple strategy? What is a compound strategy? Graphs vs compound strategies State based modelling Issues in modelling compound strategies Is a strategy being played? Examples of compound strategies
© 2006, Monash University, Australia Hypergames vs Information Conflict Strategies Hypergames in detail Hypergames involving information Hypergames and the four canonical strategies Analysis of hypergame models for each strategy. Examples and case studies
© 2006, Monash University, Australia Evolutionary Nature of Information Conflict Ideas and concepts in the theory of evolution The evolutionary hypothesis for IW in nature Examples of each of the strategies as used in nature The fallacy of counterarguments Information conflict as a natural phenomenon vs a social phenomenon Perceptions of information conflict vs the hard facts
© 2006, Monash University, Australia Analysis and Modelling of IW Models of information conflict Applying models to the real world Problem issues arising in modelling Validating models vs empirical data Risks arising in modelling problems
© 2006, Monash University, Australia Taxonomy of Information Conflict Why a taxonomy? Class I information warfare; Class II information warfare; Class III information warfare; Class IV information warfare; Denial of service attack classification Legal, cultural and political boundaries
© 2006, Monash University, Australia Impact of Information Conflict Copyright Privacy Spam Espionage Surveillance Perception management, propaganda, advertising Hacking and cyberwar Viruses/worms Identity theft
© 2006, Monash University, Australia Information Conflict vs IT Security/Encryption Basic concepts in computer security Basic ideas in cryptography The context of cryptography and security Encryption vs the canonical strategies Security vs the canonical strategies
© 2006, Monash University, Australia Law Enforcement and Organisational Security Law Enforcement vs Organisational Security When is IW a criminal offence and when not? Problem issues in Law Enforcement 1. Identifying attackers 2. Forensics and evidence 3. Legal issues in prosecution Problems in Organisational Security Protection of data and secrecy Protection of privacy
© 2006, Monash University, Australia CSE468 Information Conflict Lecturer: Dr Carlo Kopp, MIEEE, MAIAA, PEng Lecture 04 The Four Canonical Strategies of.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #33 Information Warfare November 19, 2007.
Information Warfare Theory of Information Warfare.
1 Introduction and Definitions. 2 Purpose of the Course This course is designed to provide students with hands on experience on identifying places where.
Information Warfare Playgrounds to Battlegrounds.
Information Warfare an Information Management Perspective JS Vorster & R P van Heerden Research Funding: DST, CSIR DPSS.
INFORMATION WARFARE. What is Information Warfare? “All actions taken to defend the military’s information-based processes, information systems and communications.
Acorn.gov.au The ACORN REPORT. PROTECT. PREVENT. acorn.gov.au What is cybercrime? REPORT. PROTECT. PREVENT In Australia, the term 'cybercrime' is used.
CSCE 727 Information Warfare. CSCE Farkas2 Instructor: Csilla Farkas Class time: M, W 2:50 – 4:05 pm Class Homepage:
Stephen S. Yau CSE465 & CSE591, Fall Information Assurance (IA) & Security Overview Concepts Security principles & strategies Techniques Guidelines,
OUTLINE OF SECURITY PROPOSAL Malcolm Dando. 1. The Original Design of the EMR Web of Prevention – Intelligence, Export Controls, Arms Control The Biological.
© 2006, Monash University, Australia CSE4884 Network Design and Management Lecturer: Dr Carlo Kopp, MIEEE, MAIAA, PEng Lecture 1 Introduction and Overview.
The overall classification of this briefing is: UNCLASSIFIED Introduction to Information Operations Attaché Corps- SEP 09.
THE LEGAL ENVIRONMENT OF BUSINESS © 2006 Prentice Hall Ch. 6-1 A Critical Thinking Approach Fourth Edition Nancy K. Kubasek Bartley A. Brennan M. Neil.
IT Strategy for Business © Oxford University Press 2008 All rights reserved Chapter 12 IT Security Strategies.
SE curriculum in CC2001 made by IEEE and ACM: Overview and Ideas for Our Work Katerina Zdravkova Institute of Informatics
An Introduction to... Evolutionary Game Theory By Jin Xiao, Jeff Thomas, Jeff Westwell.
Information Warfare Summary. Information Security Information Assurance Information Warfare Information Dominance.
Information Systems Ethics (Cyberethics) Dr. Robert Chi Department of Information Systems California State University, Long Beach.
© 2005 The McGraw-Hill Companies, Inc., All Rights Reserved. Chapter 2 Developing Ideas for Research and Evaluating Theories of Behavior.
Dr. Hilton CHAN Technology Crime Division Commercial Crime Bureau Corporate Information Security and Law Enforcement in Hong Kong.
WHAT IS ANTHROPOLOGY? EMPHASIS ON CULTURAL ANTHROPOLOGY Cultural Anthropology, Lecture 1 Dr. Martin.
Reducing Crime in Cyberspace: A Privacy Industry View Stephanie Perrin Adam Shostack Zero-Knowledge Systems, Inc.
Information Warfare - 11 Introduction and Preparing for Attacks.
STRATEGIC INTELLIGENCE MANAGEMENT Edited by: Babak Akhgar & Simeon Yates National Security Imperatives and Information and Communications Technologies.
What Evolution is NOT. Evolution is NOT a fact.. It is a theory: a highly probable explanation affecting all biological phenomena, with much supporting.
Rational Choice Sociology Lecture 5 Game theory I: the concept and classification of games.
1 The Broader Picture Chapter 12 Copyright 2003 Prentice-Hall.
Bus 297D/13 Legal Aspects of Managing Technology & New Product Development Instructor: Dr. Stan Malos Course Introduction and Overview Question: Why do.
Chapter 6 Business Torts and Cyber Considerations.
Topic 5: Basic Security. Topic Review... This topic will cover: - Understand the networking threats. :> Describe the risks of network intrusion. :> Sources.
Chapter 15: The Theory of Evolution. 1. The modern theory of evolution is the fundamental concept in biology.
Information Warfare Midterm Overview. Lectures Covered Everything until (including) March 2 nd Reading: – All lecture slides – Denning book: Chapters.
Cyber Crimes. Introduction Definition Types Classification.
Overview of the Lectures in the Education Module Resource Lecture No. 1.
Knowledge Issues and the TOK Presentation. “Real” World TOK World Real-Life Situation.
A Model for When Disclosure Helps Security: What is Different About Computer & Network Security? Peter P. Swire Ohio State University George Mason CII.
Responding to Cybercrime in the Post-9/11 World Scott Eltringham Computer Crime and Intellectual Property Section U.S. Department of Justice (202)
1 Ethics of Computing MONT 113G, Spring 2012 Session 37 Digital Order.
Defending Complex System Against External Impacts Gregory Levitin (IEC, UESTC)
University of Sunderland Professionalism and Personal Skills Unit 7 Professionalism and Personal Skills Lecture 7: Computer Crime.
Copyright © 2011 Pearson Education, Inc. publishing as Prentice HallChapter Achieving Success Through Effective Business Communication.
Clausewitz VS Sun Tzu Nasim Ibrahim i Clausewitz and Sun Tzu -Prussia and China vs 2000 years ago - war is the main concept for both of them.
Legal and Ethical Issues in Computer Security Csilla Farkas
John Carpenter & lecture & Information Security 2008 Lecture 1: Subject Introduction and Security Fundamentals.
1 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar.
1 Book Cover Here SECTION III SPECIAL TOPICS Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition Copyright © 2014, Elsevier Inc.
Scientific Method. My 4 out of 5 Rule If you make an observation.
© 2017 SlidePlayer.com Inc. All rights reserved.