Information Warfare Playgrounds to Battlegrounds.

Slides:



Advertisements
Similar presentations
Cyber Crime and Technology
Advertisements

A Gift of Fire, 2edChapter 7: Computer Crime1 Computer Crime.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
DoD and Cyber-Terrorism Eric Fritch CPSC 620. What is cyber-terrorism? "The premeditated, politically motivated attack against information, computer systems,
CSCE 201 Introduction to Information Security Fall 2010.
Brian Connett, LCDR, USN US NAVAL ACADEMY
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
1 6 - Outsourcing Outsourcing. © Robert G Parker – UW-CISA 2010 Dealing with issues when a portion or all of the provision of technology services is performed.
Cyber Crime Game Players By Marharyta Abreu & Iwona Sornat.
Chapter 14 Crime and Justice in the New Millennium
Information Warfare Theory of Information Warfare
EXAMINING CYBER/COMPUTER LAW BUSINESS LAW. EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Emerging business ethics issues Chapter three. Emerging business ethics issues Recognizing an ethical issue Ethical issues and dilemmas in business The.
Chapter 10 Privacy and Security McGraw-Hill
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Reliability and Security. Security How big a problem is security? Perfect security is unattainable Security in the context of a socio- technical system.
1010 CHAPTER PRIVACY AND SECURITY. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Competencies Describe concerns associated with computer.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
IT Security Readings A summary of Management's Role in Information Security in a Cyber Economy and The Myth of Secure Computing.
CYBER CRIME AND SECURITY TRENDS
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Computer Crime and CyberCrime Why we need Computer Forensics.
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Cyber Crimes.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
Cyber crime & Security Prepared by : Rughani Zarana.
Cybersecurity and the Department of Justice Vincent A. Citro, Assistant United States Attorney July 9-10, 2014 Unclassified – For Public Use.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #33 Information Warfare November 19, 2007.
Security Awareness: Applying Practical Security in Your World Chapter 1: Introduction to Security.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Forensics Services September 10, 2007.
Offensive IW Open Sources. CSCE Farkas2 Reading List – Open Source Intelligence: Private Sector Capabilities to Support DoD Policy, Acquisitions,
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
1 Book Cover Here PART D THE INFLUENCE AND IMPACT OF TECHNOLOGY Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition Copyright ©
Information Warfare Midterm Overview. Lectures Covered Everything until (including) March 2 nd Reading: – All lecture slides – Denning book: Chapters.
IT Strategy for Business © Oxford University Press 2008 All rights reserved Chapter 12 IT Security Strategies.
1 Book Cover Here SECTION III SPECIAL TOPICS Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition Copyright © 2014, Elsevier Inc.
Information Warfare Summary. Information Security Information Assurance Information Warfare Information Dominance.
Ali Alhamdan, PhD National Information Center Ministry of Interior
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
CSCE 201 Open Source Information Privacy. CSCE Farkas2 Reading List Recommended reading: – Open Source Intelligence: Private Sector Capabilities.
CYBER CRIME AND SECURITY If we can defeat them sitting at home……who needs to fight with tanks and guns!!!! Presented By Lipsita Behera. B.Sc IST, 3 rd.
A Global Approach to Protecting the Global Critical Infrastructure Dr. Stephen D. Bryen.
Hurdles in implementation of cyber security in India.
Chap1: Is there a Security Problem in Computing?.
CSCE 548 Secure Software Development Security Operations.
Information Warfare Playgrounds to Battlegrounds.
Information Technology Issues How has the proliferation of IT impacted society? Adapted from Prof. Brenda Timmerman.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Types of Cybercrime (FBI, 2000) 1.Unauthorized access by insiders (such as employees) 2.System penetration by outsiders (such as hackers) 3.Theft of proprietary.
Chapter One Copyright © 2016 Thomas J. Holt. All rights reserved.
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
BY: AUSTIN NEIGH. WHAT IS CYBER WARFARE? Hacking that is politically motivated to conduct sabotage or espionage Form of information warfare Typically.
Information Management System Ali Saeed Khan 29 th April, 2016.
Cyber crime and security issues
By: Taysha Johnson. What is an insider threat? 1.A current or former employee, contractor, or other business partner who has or had authorized access.
Information Warfare Summary. Information Security Information Assurance Information Warfare Information Dominance.
Threats By Dr. Shadi Masadeh.
MODUS OPERANDI OF CYBER CRIME
Teri Takai EXECUTIVE DIRECTOR, CENTER FOR DIGITAL GOVERNMENT.
COMPUTER CRIME.
Chapter 10: Privacy, Security, and Ethics
Chapter 13 Security and Ethical Challenges.
Prepared By : Binay Tiwari
Chapter # 3 COMPUTER AND INTERNET CRIME
5/6/2019 Information Warfare Trends, Dangers, and the Impact for European Research Policy Dipl. Pol. Ralf Bendrath, Berlin FoG:IS ReG:IS Forschungsgruppe.
Presentation transcript:

Information Warfare Playgrounds to Battlegrounds

CSCE Farkas2 Last Class: Theory of IW Information resources Players Offensive operations Defensive operations WIN-LOSE NATURE OF OPERATIONS

Security Objectives Confidentiality Integrity Availability CSCE Farkas3

Offense and Defense CSCE Farkas4 Offensive AimDefensive Action Increase availability of resource for the offense Prevent availability of resource for offense Decrease integrity of resource for the defense Ensure integrity of resource for the defense Decrease availability of resource for defense Ensure availability of resource for the defense

CSCE Farkas5 Offense: Increased availability Collection of secret: intelligence – Espionage (illegal) and intelligence (may be legal) Piracy Penetration (hacking) Superimposition fraud Superimposition fraud (use by the offense on the defense’s legitimate usage) Identity theft Identity theft Perception management Perception management (affect beliefs and behavior)

CSCE Farkas6 Offense: Decrease Availability for Defense Physical theft Physical theft Sabotage Sabotage Censorship Censorship

CSCE Farkas7 Offense: Decreased Integrity Tampering Tampering Penetration – Cover up – Virus, worm, malicious code Perception management Perception management – Fabrication, forgeries, fraud, identity theft, social engineering

Defense – What Not to do CSCE Farkas8 Closing The Barn Door After The Horse Is Gone From:

CSCE Farkas9 Defense Emergency preparedness Emergency preparedness: capability to recover from and response to attacks Prevention: keeps attacks from occurring Deterrence: makes attack unattractive Indications and warning: recognize attacks before it occurs Detection: recognize attacks Response: actions taken after the attack

Playgrounds to Battlegrounds

CSCE Farkas11 IW Activities Context of human actions and conflict Domains: – Play: hackers vs. owners – Crime: perpetrators vs. victims – Individual rights: individuals vs. individuals/organizations/government – National security: national level activities

CSCE Farkas12 Play Playing pranks Actors: hackers/crackers/phreakers Motivation: challenge, knowledge, thrill Culture: social/educational – “global networks” – publications – forums Law – DHS, Cybersecurity Laws & Regulations,

CSCE Farkas13 Crime Intellectual Property Crimes – IT targets: research and development, manufacturing and marketing plan, customer list, etc. – 1996: Economic Espionage Act (U.S. Congress) + amendments Fraud – Telemarketing scam, identity theft, bank fraud, telecommunication fraud, computer fraud and abuse Fighting crime P. Roberts, U.S. Congress Hears Of Growing Cyber Espionage Threat To U.S., 06/ , growing-cyber-espionage-threat-us http://threatpost.com/en_us/blogs/us-congress-hears- growing-cyber-espionage-threat-us

CSCE Farkas14 Crime Actors: – Employees – Temporary staff – Vendors – Suppliers – Consultants Trade secrets Identity theft Law

CSCE Farkas15 Individual Rights Privacy – Secondary use of information Free speech – Harmful/disturbing speech – Theft and distribution of intellectual property – Censorship E. Moyer, In Swartz protest, Anon hacks U.S. site, threatens leaks, 01/28/2013, _ /in-swartz-protest-anon-hacks-u.s- site-threatens-leaks/ 1009_ /in-swartz-protest-anon-hacks-u.s- site-threatens-leaks/

CSCE Farkas16 National Security Foreign Intelligence – Peace time: protecting national interests Open channels, human spies, electronic surveillance, electronic hacking (?) – War time: support military operations – U.S. Intelligence Priorities: Intelligence supporting military needs during operation Intelligence about hostile countries Intelligence about specific transnational threats – Central Intelligence Agency (CIA) – Primary targets in USA: high technology and defense- related industry

CSCE Farkas17 War and Military Conflict IT support, e.g., sensors, weapons, surveillance, etc. Psyops and perception management Physical weapons (?) Cyber space battle (?) Unmanned devices (?)

CSCE Farkas18 Terrorism Traditional: – Intelligence collection – Psyops and perception management New forms: – Exploitation of computer technologies Internet propaganda Cyber attacks (electronic mail flooding, DOS, etc.) Protection of national infrastructure

Awareness Insider threat Remote access – authentication Counterfeit hardware Abuse of security guidelines CSCE Farkas19

Origin of Attacks Vulnerable computers – Dependence on computers – Education of users – Economy – Monopoly of OS Non-state actors CSCE Farkas20