© 2006, Monash University, Australia CSE468 Information Conflict Lecturer: Dr Carlo Kopp, MIEEE, MAIAA, PEng Lecture 01 Introduction and Overview.

Slides:



Advertisements
Similar presentations
A Model for When Disclosure Helps Security: What is Different About Computer & Network Security? Peter P. Swire Ohio State University George Mason CII.
Advertisements

Political Theory Capitalism and Civil Society. Tonights lecture Introducing Hayek Spontaneous social order The market order (catallaxy) Hayeks critique.
© 2006, Monash University, Australia CSE468 Information Conflict Lecturer: Dr Carlo Kopp, MIEEE, MAIAA, PEng Lecture 04 The Four Canonical Strategies of.
Unit 1 - Introduction “bios” – life, living things, “logy” – the study of Biology - the study of life Major branches of biology: Zoology – the study of.
What Evolution is NOT. Evolution is NOT a fact.. It is a theory: a highly probable explanation affecting all biological phenomena, with much supporting.
© 2006, Monash University, Australia CSE4884 Network Design and Management Lecturer: Dr Carlo Kopp, MIEEE, MAIAA, PEng Lecture 1 Introduction and Overview.
An Introduction to... Evolutionary Game Theory
Introduction to Information Operations Attaché Corps- SEP 09
CSCE 201 Introduction to Information Security Fall 2010.
Rational Choice Sociology Lecture 5 Game theory I: the concept and classification of games.
Responding to Cybercrime in the Post-9/11 World Scott Eltringham Computer Crime and Intellectual Property Section U.S. Department of Justice (202)
Information Warfare Theory of Information Warfare
Evolving New Strategies The Evolution of Strategies in the Iterated Prisoner’s Dilemma 01 / 25.
Information Warfare an Information Management Perspective JS Vorster & R P van Heerden Research Funding: DST, CSIR DPSS.
Information Warfare - 11 Introduction and Preparing for Attacks.
Acorn.gov.au The ACORN REPORT. PROTECT. PREVENT. acorn.gov.au What is cybercrime? REPORT. PROTECT. PREVENT In Australia, the term 'cybercrime' is used.
Defending Complex System Against External Impacts Gregory Levitin (IEC, UESTC)
SE curriculum in CC2001 made by IEEE and ACM: Overview and Ideas for Our Work Katerina Zdravkova Institute of Informatics
Developing Ideas for Research and Evaluating Theories of Behavior
Stephen S. Yau CSE465 & CSE591, Fall Information Assurance (IA) & Security Overview Concepts Security principles & strategies Techniques Guidelines,
CSCD 434 Spring 2011 Lecture 1 Course Overview. Contact Information Instructor Carol Taylor 315 CEB Phone: Office.
Contemporary Perspectives. What is a “perspective”? What do you think???
Overview of the Lectures in the Education Module Resource Lecture No. 1.
What is Anthropology? emphasis on Cultural anthropology
1 Ethics of Computing MONT 113G, Spring 2012 Session 37 Digital Order.
Reducing Crime in Cyberspace: A Privacy Industry View Stephanie Perrin Adam Shostack Zero-Knowledge Systems, Inc.
Cyber Crimes.
INFORMATION WARFARE. What is Information Warfare? “All actions taken to defend the military’s information-based processes, information systems and communications.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #33 Information Warfare November 19, 2007.
CSCE 727 Information Warfare
Information Warfare Playgrounds to Battlegrounds.
University of Sunderland Professionalism and Personal Skills Unit 7 Professionalism and Personal Skills Lecture 7: Computer Crime.
Information Warfare Midterm Overview. Lectures Covered Everything until (including) March 2 nd Reading: – All lecture slides – Denning book: Chapters.
Bus 297D/13 Legal Aspects of Managing Technology & New Product Development Instructor: Dr. Stan Malos Course Introduction and Overview Question: Why do.
John Carpenter & lecture & Information Security 2008 Lecture 1: Subject Introduction and Security Fundamentals.
Information Systems Ethics (Cyberethics) Dr. Robert Chi Department of Information Systems California State University, Long Beach.
LESSON 2: Internet, Computer Ethics and Security
IT Strategy for Business © Oxford University Press 2008 All rights reserved Chapter 12 IT Security Strategies.
Chapter 6 Business Torts and Cyber Considerations.
Information Warfare Summary. Information Security Information Assurance Information Warfare Information Dominance.
Topic 5: Basic Security.
1 Introduction and Definitions. 2 Purpose of the Course This course is designed to provide students with hands on experience on identifying places where.
Dr. Hilton CHAN Technology Crime Division Commercial Crime Bureau
OUTLINE OF SECURITY PROPOSAL Malcolm Dando. 1. The Original Design of the EMR Web of Prevention – Intelligence, Export Controls, Arms Control The Biological.
1 The Broader Picture Chapter 12 Copyright 2003 Prentice-Hall.
Information Warfare Playgrounds to Battlegrounds.
1 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar.
THE LEGAL ENVIRONMENT OF BUSINESS © 2006 Prentice Hall Ch. 6-1 A Critical Thinking Approach Fourth Edition Nancy K. Kubasek Bartley A. Brennan M. Neil.
Legal and Ethical Issues in Computer Security Csilla Farkas
Chapter 15: The Theory of Evolution. 1. The modern theory of evolution is the fundamental concept in biology.
1 NES554: Computer Networks Defense Course Overview.
2/22/2016Copyright Ed Lipinski and Mesa Community College, All rights reserved.1 Research Methods Summer 2008 Developing Ideas For Research.
UNIT-4 Computer Security Classification 2 Online Security Issues Overview Computer security – The protection of assets from unauthorized access, use,
Information Warfare Summary. Information Security Information Assurance Information Warfare Information Dominance.
Dr. Maria Chr. Alvanou Criminologist-Terrorism Expert Rome 20/10/2016
Rational Choice Sociology
Evolving New Strategies
Data & Network Security
COSC 316: Host Computer Security
General Writing - Structure
Lecture 05 Compound Information Conflict Strategies
Lecture 03 Introduction to Game Theory Concepts
CSE468 Information Conflict Lecturer: Dr Carlo Kopp, MIEEE, MAIAA, PEng Forms of Information Conflict, Analysis and Modelling of Information Conflict.
Chapter 13 Security and Ethical Challenges.
DIRECTIONS Please take out a piece of paper for notes.
Lecture 06 Hypergames vs Information Conflict Strategies
5/6/2019 Information Warfare Trends, Dangers, and the Impact for European Research Policy Dipl. Pol. Ralf Bendrath, Berlin FoG:IS ReG:IS Forschungsgruppe.
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

© 2006, Monash University, Australia CSE468 Information Conflict Lecturer: Dr Carlo Kopp, MIEEE, MAIAA, PEng Lecture 01 Introduction and Overview

© 2006, Monash University, Australia Reference Sources and Bibliography NOTE: There are a limited number of publications available in this area. Dorothy E. Denning, Information Warfare and Security, ACM Press (Addison-Wesley), 1999, ISBN Winn Schwartau, Information Warfare: Cyberterrorism : Protecting Your Personal Security in the Electronic Age, New York, NY: Thunder's Mouth Press, 1995, Second Edition. Carlo Kopp’s publications at In addition, selected research papers will be referenced and discussed throughout the topic.

© 2006, Monash University, Australia Overview – Lecture Topics Shannon's information theory concepts, basic game theory concepts. Four canonical strategies of information conflict vs Shannon's information theory. Compound information conflict strategies and using graphs to model these. Hypergames vs information conflict strategies. Evolutionary nature of information conflict and biological examples. Analysis and modelling of information conflict attacks and techniques. Forms of information conflict, Class I, II, III, IV information warfare, denial of service attack classification. Information conflict vs copyright, privacy, spam, espionage, surveillance, perception management, propaganda, advertising, hacking and cyberwar, viruses/worms, and identity theft. Information conflict vs basic concepts and risks in computer security and encryption. Problems arising in law enforcement and organisational security due to the proliferation of information conflict techniques.

© 2006, Monash University, Australia What is Information Conflict? Information Conflict is a more generalised term used to describe what most of the literature calls ‘Information Warfare’, ‘InfoWar’ or ‘IW’. Contrary to the common misconception, IW is more than the study of hackers, info-terrorists, applied cryptography, espionage and electromagnetic weapons. IW in the broadest sense is the study of how information is exploited or protected in survival contests. The ‘exploitation’ aspect is centred on how the use or manipulation of information can be utilised to an advantage. The ‘protection’ aspect is centred on how to prevent an opponent from using or manipulating information to an advantage.

© 2006, Monash University, Australia Definition – Social Context United States Department of Defense: ‘Information Warfare is any action to Deny, Exploit, Corrupt or Destroy the enemy’s information and its functions; protecting ourselves against those actions and exploiting our own military information functions’. This definition describes Information Warfare in terms of ‘actions’ executed to achieve a sought outcome - denial, exploitation, corruption and destruction of an opponent’s ‘information’ and related functions, and prevention of such ‘actions’ executed by an opponent. This is the most widely used formal definition of what IW is and what it most fundamental aspects are. The definition is incomplete and it limitations will be discussed further.

© 2006, Monash University, Australia Definition – Scientific Context Kopp and Mills (2002): Information Warfare is an evolved survival aid in the biological domain … The argument by evolutionary theorists is that features in a species which improve its probability of individual survival and reproduction will be propagated, at the expense of features which impair individual survival and reproduction. Hypothesis demonstrated by showing: 1. The species employs one or more than one of the four canonical IW strategies to aid in its survival. 2. Multiple species which are not closely related, and preferably exist in diverse environments, employ the same subset of the four canonical strategies to aid in their survival. 3. Closely related species exist to the examples found, which do not employ any of the four canonical strategies to aid in their survival.

© 2006, Monash University, Australia Shannon's Information Theory Concepts What is ‘information’? Information vs data? The role of the observer? Shannon’s channel capacity theorem Shannon’s concept of entropy How Shannon applies to real world problems Examples

© 2006, Monash University, Australia Basic Game Theory Concepts What is game theory? What is a player? Von Neumann and evolution of game theory Berne’s psychological game concept Metagames – hypergames Higher order hypergames Ordinal vs cardinal games Examples - Prisoner’s dilemma game Examples - The ‘Chicken’ game

© 2006, Monash University, Australia Four Canonical Strategies of IW Why a fundamental theory? Defining the four strategies: 1. Denial of Information / Degradation or Destruction 2. Deception and Mimicry / Corruption 3. Disruption and Destruction / Denial [1] 4. Subversion / Denial [2] Shannon vs the four canonical strategies Orthogonality properties of the canonical strategies Examples of the four canonical strategies

© 2006, Monash University, Australia Compound Information Conflict Strategies What is a simple strategy? What is a compound strategy? Graphs vs compound strategies State based modelling Issues in modelling compound strategies Is a strategy being played? Examples of compound strategies

© 2006, Monash University, Australia Hypergames vs Information Conflict Strategies Hypergames in detail Hypergames involving information Hypergames and the four canonical strategies Analysis of hypergame models for each strategy. Examples and case studies

© 2006, Monash University, Australia Evolutionary Nature of Information Conflict Ideas and concepts in the theory of evolution The evolutionary hypothesis for IW in nature Examples of each of the strategies as used in nature The fallacy of counterarguments Information conflict as a natural phenomenon vs a social phenomenon Perceptions of information conflict vs the hard facts

© 2006, Monash University, Australia Analysis and Modelling of IW Models of information conflict Applying models to the real world Problem issues arising in modelling Validating models vs empirical data Risks arising in modelling problems

© 2006, Monash University, Australia Taxonomy of Information Conflict Why a taxonomy? Class I information warfare; Class II information warfare; Class III information warfare; Class IV information warfare; Denial of service attack classification Legal, cultural and political boundaries

© 2006, Monash University, Australia Impact of Information Conflict Copyright Privacy Spam Espionage Surveillance Perception management, propaganda, advertising Hacking and cyberwar Viruses/worms Identity theft

© 2006, Monash University, Australia Information Conflict vs IT Security/Encryption Basic concepts in computer security Basic ideas in cryptography The context of cryptography and security Encryption vs the canonical strategies Security vs the canonical strategies

© 2006, Monash University, Australia Law Enforcement and Organisational Security Law Enforcement vs Organisational Security When is IW a criminal offence and when not? Problem issues in Law Enforcement 1. Identifying attackers 2. Forensics and evidence 3. Legal issues in prosecution Problems in Organisational Security Protection of data and secrecy Protection of privacy