INFORMATION WARFARE Written by: Larry Druffel Presented by: Frank Dang TCOM 614 Introduction to Telecommunication University of Redlands
WARFARE TRADITIONAL WARFARE INFORMATION WARFARE
WARFARE (cont’d) TRADITIONAL WARFARE FORCE AGAINST FORCE TRAIN SOLDIER & DEVELOP WEAPONS NEED RESOURCE RULES OF ENGAGEMENT
WARFARE (cont’d) INFORMATION WARFARE INITIATE BY A SMALL NUMBER DOES NOT NEED RESOURCES NO RULES OF ENGAGEMENT INCUR LITTLE PERSONAL RISK MIGHT NOT EVEN BE IDENTIFIED
HOSTILE ACTION VANDALISM INVASION OF PRIVACY INDIVIDUAL FILE, FINANCIAL RECORD, CREDIT CARD USE/HISTORY FRAUD OR THEFT AIMED AT FINANCIAL GAIN CREDIT CARD NUMBER ESPIONAGE DESIGN OF NEW AUTO MANUFACTURING PROCESS PRODUCTION CAPACITY
VARIETY OF THREATS SERVICE MAY BE DENIED RESOURCE MAY BE ABUSED DATA MAY BE CORRUPTED DATA MAY BE LOST DATA MAY BE STOLEN
DETECTION INCREASE STATE OF READINESS INCREASED SECURITY: TRAINED PEOPLE HOSTILITY ATTACK MUST BE DETECTED AND COUNTERED DAMAGE ASSESSMENT WHAT IS WORKING WHAT INFORMATION HAS BEEN CORRUPTED WHAT TRAP DOORS LEFT TO BE EXPLOITED LATER
RESPONSIBILITY OF PROTECTION AN INDIVIDUAL RESPONSIBILITY POOR CHOICE OF PASSWORD CARELESS ABOUT RUNNING VIRUS CHECK DO NOT USE ENCRYPTION
INDIVIDUAL CAN’T DO INDIVIDUAL CAN’T DO BY THEMSELVES COMPANY PROVIDES TOOLS SYSTEM ADMINISTRATOR: BACKUP FILES MONITOR THE USE OF SYSTEM FOR VIOLATION
HELP – HOSTILE ACTION THE FORUM OF INCIDENT RESPONSE AND SECURITY TEAM (FIRST) HAS MORE THAN 50 ORGANIZATIONS COOPERATE TO BATTLE HOSTILE ACTION PROVIDE HELPS TO SYSTEM ADMINISTRATORS ONLY HAS NO AUTHORITY PROVIDE ONLY TECHNICAL ASISTANCE AND ADVICE
PROFESSIONALS MAKE TECHNOLOGY MORE ACCESSIBLE INFORM PUBLIC ABOUT THEIR RIGHTS NOT TO ABUSE THEIR KNOWLEDGE
CONCLUSION THE WORLD OF NETWORKED COMPUTING IS DANGEROUS WE HAVE A RESPONSIBILITY TO PROTECT OURSELVES OUR FELLOW USERS