Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #33 Information Warfare November 19, 2007.

Slides:



Advertisements
Similar presentations
Cyber Crime and Technology
Advertisements

Thai delegation Presentation at 4 th ARF seminar on Cyber-terrorism
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #26 Emerging Technologies.
© 2006, Monash University, Australia CSE468 Information Conflict Lecturer: Dr Carlo Kopp, MIEEE, MAIAA, PEng Lecture 01 Introduction and Overview.
DoD and Cyber-Terrorism Eric Fritch CPSC 620. What is cyber-terrorism? "The premeditated, politically motivated attack against information, computer systems,
Class 11: Information Systems Ethics and Crime MIS 2101: Management Information Systems Based on material from Information Systems Today: Managing in the.
Chapter 9: Privacy, Crime, and Security
Addressing Terrorist Use of the Internet, Cyber Crime and Other Threats: National Expert Workshop Forging a Comprehensive Approach to Cyber Security Richard.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Computer Crime and Digital Forensics.
Information Warfare Theory of Information Warfare
Information Warfare an Information Management Perspective JS Vorster & R P van Heerden Research Funding: DST, CSIR DPSS.
Chapter 10 Privacy and Security McGraw-Hill
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
CYBER CRIME AND SECURITY TRENDS
1J. M. Kizza - Ethical And Social Issues Module 13: Ethical, Privacy, and Security Issues in the Online Social Network Ecosystems Introduction Introduction.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Submitted by: Abhashree Pradhan CA (1)
Securing Information Systems
Kholoud AlSafadi Ethical Issues in Information Systems and the Internet.
Cyber Crimes.
CSCE 727 Strategic Information Warfare. National Security Issues Information Warfare - Farkas2 Interesting read: B. Baer Arnold, Cyber war in Ukraine.
Cyber crime & Security Prepared by : Rughani Zarana.
Cybersecurity and the Department of Justice Vincent A. Citro, Assistant United States Attorney July 9-10, 2014 Unclassified – For Public Use.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Forensics Services September 10, 2007.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
Information Warfare Playgrounds to Battlegrounds.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
Data Mining for Security Applications Dr. Bhavani Thuraisingham The University of Texas at Dallas January 2006.
Economic Development for the DFW Metroplex Related to Security: An Academic Perspective Dr. Bhavani Thuraisingham The University of Texas at Dallas December.
PACIFIC RIM SECURITY CONFERENCE CYBERATTACK: A NEW STRATEGIC WEAPON David Elliott February 24, 2010.
Secure Sensor Data/Information Management and Mining Bhavani Thuraisingham The University of Texas at Dallas October 2005.
Information Warfare Summary. Information Security Information Assurance Information Warfare Information Dominance.
C4ISR and Information Warfare Naval Weapons Systems.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Application Forensics October 26, 2009.
What is computer ethics?  Computer Ethics is a branch of practical philosophy which deals with how computing professionals should make decisions regarding.
CYBER CRIME AND SECURITY If we can defeat them sitting at home……who needs to fight with tanks and guns!!!! Presented By Lipsita Behera. B.Sc IST, 3 rd.
Hurdles in implementation of cyber security in India.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #1 Biometrics and Other Emerging Technologies in Applications.
Information Warfare Playgrounds to Battlegrounds.
E NGINEERING STUDIES IN T ELECOMMUNICATIONS S ECURITY School of Communication Engineering.
1 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar.
INFORMATION TECHNOLOGY IN A GLOBAL SOCIETY: SECURITY Taylor Moncrief.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #1 Introduction to Data and Applications Security and Digital Forensics.
Homeland Security CJ 355 Unit 6 Professor David R. Thompson.
Erik Jonsson School of Engineering and Computer Science The University of Texas at Dallas Cyber Security Research on Engineering Solutions Dr. Bhavani.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #25 Dependable Data Management.
Regional Cyber Crime Unit
Chapter One Copyright © 2016 Thomas J. Holt. All rights reserved.
BY: AUSTIN NEIGH. WHAT IS CYBER WARFARE? Hacking that is politically motivated to conduct sabotage or espionage Form of information warfare Typically.
Information Management System Ali Saeed Khan 29 th April, 2016.
Cyber crime and security issues
NANDHA ENGINEERING COLLEGE ERODE-52. CYBER WAR-A NEW FACE OF TERRORISM Guided byGuided by E.Kanimozhi,M.EE.Kanimozhi,M.E AP/Dept of ITAP/Dept of IT PRESENTED.
Information Warfare Summary. Information Security Information Assurance Information Warfare Information Dominance.
Securing Information Systems
Dr. Maria Chr. Alvanou Criminologist-Terrorism Expert Rome 20/10/2016
What is Cyber Security Cyber War Cyber Power?
Cyber crime and security issues
Securing Information Systems
Cyber Crimes Chunlian QU 9/18/2018.
Cyber Threat Simulation
The Broader Picture Laws Governing Hacking and Other Computer Crimes
Chapter 13 Security and Ethical Challenges.
Data and Applications Security Developments and Directions
5/6/2019 Information Warfare Trends, Dangers, and the Impact for European Research Policy Dipl. Pol. Ralf Bendrath, Berlin FoG:IS ReG:IS Forschungsgruppe.
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Presentation transcript:

Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #33 Information Warfare November 19, 2007

Outline l What is Information Warfare? l Defensive Strategies for Government and Industry l Military Tactics l Terrorism and Information Warfare l Tactics of Private Corporations l Future IW strategies l Surveillance Tools l The Victims of Information Warfare l Appendix: Surveillance l Reference Part IV of Text Book

What is Information Warfare? l Information warfare is the use and management of information in pursuit of a competitive advantage over an opponent. Information warfare may involve collection of tactical information, assurance that one's own information is valid, spreading of propaganda or disinformation to demoralize the enemy and the public, undermining the quality of opposing force information and denial of information collection opportunities to opposing forces.collectionassurancepropagandadisinformation demoralizeenemy l

Defensive Strategies for Government and Industry l Are US and Foreign governments prepared for Information Warfare - According to John Vacca, US will be most affected with 60% of the world’s computing power - Stealing sensitive information as well as critical, information to cripple an economy (e.g., financial information) l What have industry groups done - IT-SAC: Information Technology Information Sharing and Analysis l Will strategic diplomacy help with Information Warfare? l Educating the end user is critical according to John Vacca

Defensive Strategies for Government and Industry l What are International organizations? - Think Tanks and Research agencies - Book cites several countries from Belarus to Taiwan engaged in Economic Espionage and Information Warfare l Risk-based analysis l Military alliances - Coalition forces – US, UK, Canada, Australia have regular meetings on Information Warfare l Legal implications l Strong parallels between National Security and Cyber Security

Military Tactics l Supporting Technologies - Agents, XML, Human Computer Interaction l Military tactics - Planning, Security, Intelligence l Tools - Offensive Ruinous IW tools l Launching massive distributed denial of service attacks - Offensive Containment IW tools l Operations security, Military deception, Psychological operations, Electronic warfare (use electromagnetic energy), Targeting: Disable enemy's C2 (c0mmand and control) system and capability

Military Tactics l Tools (continued) - Defensive Preventive IW Tools l Monitor networks - Defensive Ruinous IW tools l Information operations - Defensive Responsive Containment IW tools l Handle hacking, viruses. l Other aspects - Dealing with sustained terrorist IW tactics, Dealing with random terrorist IW tactics

Terrorism and Information Warfare l Terrorists are using the web to carry out terrorism activities l What are the profiles of terrorists? Are they computer literate? l Hacker controlled tanks, planes and warships l Is there a Cyber underground network? l What are their tools? - Information weapons, HERF gun (high power radio energy at an electronic target), Electromagnetic pulse. Electric power disruptive technologies l Why are they hard to track down? - Need super forensics tools

Tactics of Private Corporations l Defensive tactics - Open course intelligence, Gather business intelligence l Offensive tactics - Packet sniffing, Trojan horse etc. l Prevention tactics - Security techniques such as encryption l Survival tactics - Forensics tools

Future IW Tactics l Electromagnetic bomb - Technology, targeting and delivery l Improved conventional method - Virus, worms, trap doors, Trojan horse l Global positioning systems l Nanotechnology developments - Nano bombs

Surveillance Tools l Data emanating from sensors: - Video data, surveillance data - Data has to be analyzed - Monitoring suspicious events l Data mining - Determining events/activities that are abnormal l Biometrics technologies l Privacy is a concern

Victims of Information Warfare l Loss of money and funds l Loss of shelter, food and water l Spread of disease l Identity theft l Privacy violations l Death and destruction l Note: Computers can be hacked to loose money and identity; computers can be used to commit a crime resulting in death and destruction