Presentation is loading. Please wait.

Presentation is loading. Please wait.

Information Warfare Playgrounds to Battlegrounds.

Similar presentations


Presentation on theme: "Information Warfare Playgrounds to Battlegrounds."— Presentation transcript:

1 Information Warfare Playgrounds to Battlegrounds

2 CSCE 727 - Farkas2 Last Class: Theory of IW Information resources Players Offensive operations Defensive operations WIN-LOSE NATURE OF OPERATIONS

3 Security Objectives Confidentiality Integrity Availability CSCE 727 - Farkas3

4 Offense and Defense CSCE 727 - Farkas4 Offensive AimDefensive Action Increase availability of resource for the offense Prevent availability of resource for offense Decrease integrity of resource for the defense Ensure integrity of resource for the defense Decrease availability of resource for defense Ensure availability of resource for the defense

5 CSCE 727 - Farkas5 Offense: Increased availability Collection of secret: intelligence – Espionage (illegal) and intelligence (may be legal) Piracy Penetration (hacking) Superimposition fraud Superimposition fraud (use by the offense on the defense’s legitimate usage) Identity theft Identity theft Perception management Perception management (affect beliefs and behavior)

6 CSCE 727 - Farkas6 Offense: Decrease Availability for Defense Physical theft Physical theft Sabotage Sabotage Censorship Censorship

7 CSCE 727 - Farkas7 Offense: Decreased Integrity Tampering Tampering Penetration – Cover up – Virus, worm, malicious code Perception management Perception management – Fabrication, forgeries, fraud, identity theft, social engineering

8 Defense – What Not to do CSCE 727 - Farkas8 Closing The Barn Door After The Horse Is Gone From: http://blog.johnlund.com/2013/10/closing-barn-door-after-horse-is-gone.htmlhttp://blog.johnlund.com/2013/10/closing-barn-door-after-horse-is-gone.html

9 CSCE 727 - Farkas9 Defense Emergency preparedness Emergency preparedness: capability to recover from and response to attacks Prevention: keeps attacks from occurring Deterrence: makes attack unattractive Indications and warning: recognize attacks before it occurs Detection: recognize attacks Response: actions taken after the attack

10 Playgrounds to Battlegrounds

11 CSCE 727 - Farkas11 IW Activities Context of human actions and conflict Domains: – Play: hackers vs. owners – Crime: perpetrators vs. victims – Individual rights: individuals vs. individuals/organizations/government – National security: national level activities

12 CSCE 727 - Farkas12 Play Playing pranks Actors: hackers/crackers/phreakers Motivation: challenge, knowledge, thrill Culture: social/educational – “global networks” – publications – forums Law – DHS, Cybersecurity Laws & Regulations, http://www.dhs.gov/cybersecurity-laws-regulations http://www.dhs.gov/cybersecurity-laws-regulations

13 CSCE 727 - Farkas13 Crime Intellectual Property Crimes – IT targets: research and development, manufacturing and marketing plan, customer list, etc. – 1996: Economic Espionage Act (U.S. Congress) + amendments Fraud – Telemarketing scam, identity theft, bank fraud, telecommunication fraud, computer fraud and abuse Fighting crime P. Roberts, U.S. Congress Hears Of Growing Cyber Espionage Threat To U.S., 06/29. 2012, http://threatpost.com/en_us/blogs/us-congress-hears- growing-cyber-espionage-threat-us-062912http://threatpost.com/en_us/blogs/us-congress-hears- growing-cyber-espionage-threat-us-062912

14 CSCE 727 - Farkas14 Crime Actors: – Employees – Temporary staff – Vendors – Suppliers – Consultants Trade secrets Identity theft Law

15 CSCE 727 - Farkas15 Individual Rights Privacy – Secondary use of information Free speech – Harmful/disturbing speech – Theft and distribution of intellectual property – Censorship E. Moyer, In Swartz protest, Anon hacks U.S. site, threatens leaks, 01/28/2013, http://news.cnet.com/8301- 1009_3-57566016-83/in-swartz-protest-anon-hacks-u.s- site-threatens-leaks/http://news.cnet.com/8301- 1009_3-57566016-83/in-swartz-protest-anon-hacks-u.s- site-threatens-leaks/

16 CSCE 727 - Farkas16 National Security Foreign Intelligence – Peace time: protecting national interests Open channels, human spies, electronic surveillance, electronic hacking (?) – War time: support military operations – U.S. Intelligence Priorities: Intelligence supporting military needs during operation Intelligence about hostile countries Intelligence about specific transnational threats – Central Intelligence Agency (CIA) – Primary targets in USA: high technology and defense- related industry

17 CSCE 727 - Farkas17 War and Military Conflict IT support, e.g., sensors, weapons, surveillance, etc. Psyops and perception management Physical weapons (?) Cyber space battle (?) Unmanned devices (?)

18 CSCE 727 - Farkas18 Terrorism Traditional: – Intelligence collection – Psyops and perception management New forms: – Exploitation of computer technologies Internet propaganda Cyber attacks (electronic mail flooding, DOS, etc.) Protection of national infrastructure

19 Awareness Insider threat Remote access – authentication Counterfeit hardware Abuse of security guidelines CSCE 727 - Farkas19

20 Origin of Attacks Vulnerable computers – Dependence on computers – Education of users – Economy – Monopoly of OS Non-state actors CSCE 727 - Farkas20


Download ppt "Information Warfare Playgrounds to Battlegrounds."

Similar presentations


Ads by Google