Presentation is loading. Please wait.

Presentation is loading. Please wait.

Information Warfare - 11 Introduction and Preparing for Attacks.

Similar presentations


Presentation on theme: "Information Warfare - 11 Introduction and Preparing for Attacks."— Presentation transcript:

1 Information Warfare - 11 Introduction and Preparing for Attacks

2 Information Warfare - 12 Purpose of the Course This course is concerned with strategy and tactics as applied to the defense of information. The focus of the course is defending computer networks and hosts against attack, including both recognition and response to attacks.

3 Information Warfare - 13 Texts Know Your Enemy, Honeynet Project (Enemy) The Art of War, Sun Tzu (Griffith Translation), or use text from Internet: http://classics.mit.edu/Tzu/artwar.1b.txt (Sun) http://classics.mit.edu/Tzu/artwar.1b.txt

4 Information Warfare - 14 Grading 20% (each) two graded homeworks 60% Final Paper (Topic related to Information Warfare, Submit paragraph-length proposal by 3/21) Joint work to understand allowed Work for submission is to be individual unless otherwise approved

5 Information Warfare - 15 Preparing for Conflict Sun Tzu said: The art of war is of vital importance to the State. It is a matter of life and death, a road either to safety or to ruin. Hence it is a subject of inquiry which can on no account be neglected. Why information warfare?

6 Information Warfare - 16 Information Warfare “Information warfare is the offensive and defensive use of information and information systems to deny, exploit, corrupt, or destroy, an adversary's information, information-based processes, information systems, and computer-based networks while protecting one's own. Such actions are designed to achieve advantages over military or business adversaries.” Dr. Ivan Goldberg

7 Information Warfare - 17 Why look at Information Warfare? Most intruder activity is not information warfare –Cyber-vandalism –Cyber-crime Advanced intruders are becoming more commercial –Financial targets –Hack-for-hire –Hack-for-sales (e.g., spamming)

8 Information Warfare - 18 Why look at Information Warfare - 2 Advanced intruders are becoming more strategic –Deniability –Stealthy communication / exploit –Attack through intermediates Defense needs to be more strategic –Avoid time-consumptive response where possible –Avoid damage/costs –Avoid ceding the advantage to the intruder

9 Information Warfare - 19 Information Warfare is NOT New In one form or another IW as old as war Every great military writer discusses Old idea with new name How old is it?

10 Information Warfare - 110 As Old As War Itself Sun Tzu (4 th Century B.C.) Machiavelli (15 th Century) Jomini (19 th Century) Toffler (20 th Century)

11 Information Warfare - 111 The Theory: Models C2 / Counter C2 Five Pillars ObserveAct Plan Evaluate ConcealFrustrate Misdirect Confuse Security DeceptionDestructionPsychological Warfare Command and Control

12 Information Warfare - 112 What is the Value of IW? Degrades the enemy’s ability to wage war Enhances your ability to wage war Provides operational control Allows for superior intelligence and situational awareness

13 Information Warfare - 113 The Pillars - Security Intelligence gathering The more you know the better your strategy Protection of critical information Even seemingly innocent information can have value to the enemy Information Superiority a prime goal

14 Information Warfare - 114 The Pillars - Deception Concealing intent of attack Concealing extent of attack Concealing methods of attack Concealing methods of defense Concealing objects of attack

15 Information Warfare - 115 Deception “ All warfare is based on deception. Hence, when able to attack, we must seem unable; when using our forces, we must seem inactive; when we are near, we must make the enemy believe we are far away; when far away, we must make him believe we are near.” (Sun Tzu)

16 Information Warfare - 116 The Pillars - Destruction Elimination of communications Computer Network Attack Destruction of Information Infrastructure Goal is to create chaos Destruction almost always limited

17 Information Warfare - 117 The Pillars – Psychological Warfare PsyOps is perception management Not always propaganda Not always deceptive Not always used against the enemy Examples: Persian Gulf and Bosnia

18 Information Warfare - 118 The Pillars – Command and Control No army can win without it C2 provides direction and focus to armies Good C2 essential to morale and belief in leaders Always a major target

19 Information Warfare - 119 Sun Tzu’s Aspects of Conflict Moral Law Heaven Earth Commander Method and Discipline

20 Information Warfare - 120 Moral Law Tau Morale or Purpose Attractiveness or Charisma of Leaders or of Purpose

21 Information Warfare - 121 Heaven Times and Seasons Occasion Weather Pacing and Scheduling of attack

22 Information Warfare - 122 Earth The battlefield The network –Services –Defenses –Users/Clients –Defenders/Administrators

23 Information Warfare - 123 Commander Personality Skills Preparation Motivation Reward

24 Information Warfare - 124 Method and Discipline Tools Procedures / Strategy Care in application / Reserves Preparation Assessment Follow-up

25 Information Warfare - 125 Circumstances Attack-aiding circumstances –Defender inattention –Window of vulnerability –Instability Attack-inhibiting circumstances –Instability –Defender focus –Distraction

26 Information Warfare - 126 Examples of Information Warfare Zapatista Information Strike India/Pakistan Kashmir Cyber Conflict Some marketing pitches Copyright infringement legal maneuvers

27 Information Warfare - 127 Facing the Enemy “Hold out baits to entice the enemy. Feign disorder and crush him. If he is secure at all points, be prepared for him. If he is in superior strength, avoid him. If you opponent is of choleric temper, seek to irritate him. Pretend to be weak, that he may grow arrogant. If he is taking his ease, give him no rest. If his forces are united, separate them. Attack him where he is unprepared, appear where you are not expected. These military devices, leading to victory, must not be divulged beforehand.”

28 Information Warfare - 128 The Rest of the Course Strategy Technology implementation Insider threat Attackers and defenders Physical and Cyber attacks Future


Download ppt "Information Warfare - 11 Introduction and Preparing for Attacks."

Similar presentations


Ads by Google