INFORMATION WARFARE Written by: Larry Druffel Presented by: Frank Dang TCOM 614 Introduction to Telecommunication University of Redlands.

Slides:



Advertisements
Similar presentations
ETHICAL HACKING A LICENCE TO HACK
Advertisements

INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Ethics, Privacy and Information Security
Department of Revenue Lessons for Management by Department of Revenue Internal Audit.
Chapter 1.  Security Problem  Virus and Worms  Intruders  Types of Attack  Avenues of Attack 2 Prepared by Mohammed Saher Hasan.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
1 MIS 2000 Class 22 System Security Update: Winter 2015.
Is There a Security Problem in Computing? Network Security / G. Steffen1.
Ch 14 – The Leaders of the Future Ch 15 – Information Warfare Ch 14 by Fernando Flores Ch 15 by Larry Druffel This totally awesome presentation by Les.
1 Network Security Ola Flygt Växjö University
Cyber Crime Game Players By Marharyta Abreu & Iwona Sornat.
CERT ® System and Network Security Practices Presented by Julia H. Allen at the NCISSE 2001: 5th National Colloquium for Information Systems Security Education,
1 Telstra in Confidence Managing Security for our Mobile Technology.
Course ILT Security overview Unit objectives Discuss network security Discuss security threat trends and their ramifications Determine the factors involved.
FIT3105 Security and Identity Management Lecture 1.
Network Security Peter Behrens Seth Elschlager. Computer Security Preventing unauthorized use of your network and information within that network. Preventing.
CYBER CRIME AND SECURITY TRENDS
Network Security. Trust Relationships (Trust Zones) High trust (internal) = f c (once you gain access); g p Low trust ( ) = more controls; fewer privileges.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Course: Introduction to Computers Lecture: 6.  Commercial software is covered by Copyrights.  You have to pay for it and register to have the license.
Business computer application University of Palestine College of Business Instructor: Mr. Ahmed Abumosameh.
Security of Data. Key Ideas from syllabus Security of data Understand the importance of and the mechanisms for maintaining data security Understand the.
© Paradigm Publishing Inc. 8-1 Chapter 8 Security Issues and Strategies.
Business computer application University of Palestine College of Business Instructor: Mr. Ahmed Abumosameh.
What does “secure” mean? Protecting Valuables
Prepared by: Dinesh Bajracharya Nepal Security and Control.
Asset & Security Management Chapter 9. IT Asset Management (ITAM) Is the process of tracking information about technology assets through the entire asset.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
Unethical use of Computers and Networks
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
COMPUTER ETHICS Owda Shaqalih Hussam Hamada Nedal ALshorafa.
Operating system Security By Murtaza K. Madraswala.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
APPLICATION PENETRATION TESTING Author: Herbert H. Thompson Presentation by: Nancy Cohen.
Data protection This means ensuring that stored data does not get changed, removed or accessed accidentally or by unauthorised people. Data can be corrupted,
1 Policy Types l Program l Issue Specific l System l Overall l Most Generic User Policies should be publicized l Internal Operations Policies should be.
Topic 5: Basic Security.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Security Policies. Threats to security and integrity  Threats to information systems include  Human error –keying errors, program errors, operator errors,
Chap1: Is there a Security Problem in Computing?.
Security and Assurance in IT organization Name: Mai Hoang Nguyen Class: INFO 609 Professor: T. Rohm.
Computer crimes.
Computer Security By Duncan Hall.
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
SECURITY ISSUES. TYPES BLUE JACKING SENDING MESSAGES TO OPEN BLUETOOTH CONNECTION VIRUSES HARMFUL PROGRAMS THAT SPREAD WITHIN DIGITAL DEVICES COOKIES.
DATA PROTECTION 2003 THEORY AND PRACTICE OF HANDLING WITH THE COMPUTER CRIME IN THE REPUBLIC OF MACEDONIA Belgrad.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
E-Commerce E-Commerce Security?? Instructor: Safaa S.Y. Dalloul E-Business Level Try to be the Best.
Security risks in a network. Remote access  When you connect a computer to a network it is visible to all other computers on the network. When you connect.
1 Integrated Site Security Project Denise Heagerty CERN 22 May 2007.
The Need for Information Security(2) Lecture 3. Slide 2 Information Extortion  Information extortion is an attacker or formerly trusted insider stealing.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
ASHRAY PATEL Securing Public Web Servers. Roadmap Web server security problems Steps to secure public web servers Securing web servers and contents Implementing.
Scott Hervoyavich December 6 th, 2011 CYBERCRIME.
Chapter 15 Telecommunication Department Management.
PRESENTED BY Raju. What is information security?  Information security is the process of protecting information. It protects its availability, privacy.
Overview of Joe B. Taylor CS 591 Fall Introduction  Thriving defense manufacturing firm  System administrator angered  His role diminished with.
Information Security and Privacy in HRIS
Operating system Security
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Cyber Crimes Chunlian QU 9/18/2018.
Five Unethical Uses of Computers
Computer Ethics.
Who Uses Encryption? Module 7 Section 3.
Security week 1 Introductions Class website Syllabus review
Presentation transcript:

INFORMATION WARFARE Written by: Larry Druffel Presented by: Frank Dang TCOM 614 Introduction to Telecommunication University of Redlands

WARFARE TRADITIONAL WARFARE INFORMATION WARFARE

WARFARE (cont’d) TRADITIONAL WARFARE FORCE AGAINST FORCE TRAIN SOLDIER & DEVELOP WEAPONS NEED RESOURCE RULES OF ENGAGEMENT

WARFARE (cont’d) INFORMATION WARFARE INITIATE BY A SMALL NUMBER DOES NOT NEED RESOURCES NO RULES OF ENGAGEMENT INCUR LITTLE PERSONAL RISK MIGHT NOT EVEN BE IDENTIFIED

HOSTILE ACTION VANDALISM INVASION OF PRIVACY INDIVIDUAL FILE, FINANCIAL RECORD, CREDIT CARD USE/HISTORY FRAUD OR THEFT AIMED AT FINANCIAL GAIN CREDIT CARD NUMBER ESPIONAGE DESIGN OF NEW AUTO MANUFACTURING PROCESS PRODUCTION CAPACITY

VARIETY OF THREATS SERVICE MAY BE DENIED RESOURCE MAY BE ABUSED DATA MAY BE CORRUPTED DATA MAY BE LOST DATA MAY BE STOLEN

DETECTION INCREASE STATE OF READINESS INCREASED SECURITY: TRAINED PEOPLE HOSTILITY ATTACK MUST BE DETECTED AND COUNTERED DAMAGE ASSESSMENT WHAT IS WORKING WHAT INFORMATION HAS BEEN CORRUPTED WHAT TRAP DOORS LEFT TO BE EXPLOITED LATER

RESPONSIBILITY OF PROTECTION AN INDIVIDUAL RESPONSIBILITY POOR CHOICE OF PASSWORD CARELESS ABOUT RUNNING VIRUS CHECK DO NOT USE ENCRYPTION

INDIVIDUAL CAN’T DO INDIVIDUAL CAN’T DO BY THEMSELVES COMPANY PROVIDES TOOLS SYSTEM ADMINISTRATOR: BACKUP FILES MONITOR THE USE OF SYSTEM FOR VIOLATION

HELP – HOSTILE ACTION THE FORUM OF INCIDENT RESPONSE AND SECURITY TEAM (FIRST) HAS MORE THAN 50 ORGANIZATIONS COOPERATE TO BATTLE HOSTILE ACTION PROVIDE HELPS TO SYSTEM ADMINISTRATORS ONLY HAS NO AUTHORITY PROVIDE ONLY TECHNICAL ASISTANCE AND ADVICE

PROFESSIONALS MAKE TECHNOLOGY MORE ACCESSIBLE INFORM PUBLIC ABOUT THEIR RIGHTS NOT TO ABUSE THEIR KNOWLEDGE

CONCLUSION THE WORLD OF NETWORKED COMPUTING IS DANGEROUS WE HAVE A RESPONSIBILITY TO PROTECT OURSELVES OUR FELLOW USERS