Download presentation
Presentation is loading. Please wait.
1
Information Warfare Playgrounds to Battlegrounds
2
CSCE 727 - Farkas2 Last Class: Theory of IW Information resources Players Offensive operations Defensive operations WIN-LOSE NATURE OF OPERATIONS
3
Security Objectives Confidentiality Integrity Availability CSCE 727 - Farkas3
4
Offense and Defense CSCE 727 - Farkas4 Offensive AimDefensive Action Increase availability of resource for the offense Prevent availability of resource for offense Decrease integrity of resource for the defense Ensure integrity of resource for the defense Decrease availability of resource for defense Ensure availability of resource for the defense
5
CSCE 727 - Farkas5 Offense: Increased availability Collection of secret: intelligence – Espionage (illegal) and intelligence (may be legal) Piracy Penetration (hacking) Superimposition fraud Superimposition fraud (use by the offense on the defense’s legitimate usage) Identity theft Identity theft Perception management Perception management (affect beliefs and behavior)
6
CSCE 727 - Farkas6 Offense: Decrease Availability for Defense Physical theft Physical theft Sabotage Sabotage Censorship Censorship
7
CSCE 727 - Farkas7 Offense: Decreased Integrity Tampering Tampering Penetration – Cover up – Virus, worm, malicious code Perception management Perception management – Fabrication, forgeries, fraud, identity theft, social engineering
8
Defense – What Not to do CSCE 727 - Farkas8 Closing The Barn Door After The Horse Is Gone From: http://blog.johnlund.com/2013/10/closing-barn-door-after-horse-is-gone.htmlhttp://blog.johnlund.com/2013/10/closing-barn-door-after-horse-is-gone.html
9
CSCE 727 - Farkas9 Defense Emergency preparedness Emergency preparedness: capability to recover from and response to attacks Prevention: keeps attacks from occurring Deterrence: makes attack unattractive Indications and warning: recognize attacks before it occurs Detection: recognize attacks Response: actions taken after the attack
10
Playgrounds to Battlegrounds
11
CSCE 727 - Farkas11 IW Activities Context of human actions and conflict Domains: – Play: hackers vs. owners – Crime: perpetrators vs. victims – Individual rights: individuals vs. individuals/organizations/government – National security: national level activities
12
CSCE 727 - Farkas12 Play Playing pranks Actors: hackers/crackers/phreakers Motivation: challenge, knowledge, thrill Culture: social/educational – “global networks” – publications – forums Law – DHS, Cybersecurity Laws & Regulations, http://www.dhs.gov/cybersecurity-laws-regulations http://www.dhs.gov/cybersecurity-laws-regulations
13
CSCE 727 - Farkas13 Crime Intellectual Property Crimes – IT targets: research and development, manufacturing and marketing plan, customer list, etc. – 1996: Economic Espionage Act (U.S. Congress) + amendments Fraud – Telemarketing scam, identity theft, bank fraud, telecommunication fraud, computer fraud and abuse Fighting crime P. Roberts, U.S. Congress Hears Of Growing Cyber Espionage Threat To U.S., 06/29. 2012, http://threatpost.com/en_us/blogs/us-congress-hears- growing-cyber-espionage-threat-us-062912http://threatpost.com/en_us/blogs/us-congress-hears- growing-cyber-espionage-threat-us-062912
14
CSCE 727 - Farkas14 Crime Actors: – Employees – Temporary staff – Vendors – Suppliers – Consultants Trade secrets Identity theft Law
15
CSCE 727 - Farkas15 Individual Rights Privacy – Secondary use of information Free speech – Harmful/disturbing speech – Theft and distribution of intellectual property – Censorship E. Moyer, In Swartz protest, Anon hacks U.S. site, threatens leaks, 01/28/2013, http://news.cnet.com/8301- 1009_3-57566016-83/in-swartz-protest-anon-hacks-u.s- site-threatens-leaks/http://news.cnet.com/8301- 1009_3-57566016-83/in-swartz-protest-anon-hacks-u.s- site-threatens-leaks/
16
CSCE 727 - Farkas16 National Security Foreign Intelligence – Peace time: protecting national interests Open channels, human spies, electronic surveillance, electronic hacking (?) – War time: support military operations – U.S. Intelligence Priorities: Intelligence supporting military needs during operation Intelligence about hostile countries Intelligence about specific transnational threats – Central Intelligence Agency (CIA) – Primary targets in USA: high technology and defense- related industry
17
CSCE 727 - Farkas17 War and Military Conflict IT support, e.g., sensors, weapons, surveillance, etc. Psyops and perception management Physical weapons (?) Cyber space battle (?) Unmanned devices (?)
18
CSCE 727 - Farkas18 Terrorism Traditional: – Intelligence collection – Psyops and perception management New forms: – Exploitation of computer technologies Internet propaganda Cyber attacks (electronic mail flooding, DOS, etc.) Protection of national infrastructure
19
Awareness Insider threat Remote access – authentication Counterfeit hardware Abuse of security guidelines CSCE 727 - Farkas19
20
Origin of Attacks Vulnerable computers – Dependence on computers – Education of users – Economy – Monopoly of OS Non-state actors CSCE 727 - Farkas20
Similar presentations
© 2024 SlidePlayer.com Inc.
All rights reserved.