csce727-summary

csce727-summary - Information Warfare Information Summary...

Info iconThis preview shows pages 1–13. Sign up to view the full content.

View Full Document Right Arrow Icon
Information Warfare Information Warfare Summary Summary
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Terminalogy Terminalogy Information Security Information Assurance Information Warfare Information Dominance
Background image of page 2
CSCE 727 - Farkas 3 Information Security (INFOSEC) Information Security (INFOSEC) Protection of information against intentional or unintentional unauthorized Disclosure (confidentiality) Modification (integrity) Destruction (availability) Concerned mainly with owned resources
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
CSCE 727 - Farkas 4 Security Tradeoffs COST Security Functionality Ease of Use
Background image of page 4
CSCE 727 - Farkas 5 Information Assurance Information Assurance Information security (prevention ) plus Authenticity and non-repudiation Detection and reaction capabilities Additional threats, like perception managements and exploitation of public media Addresses intentional or unintentional threats
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
CSCE 727 - Farkas 6 Information Warfare Information Warfare Addresses only intentional attacks Information in any form and transmitted over any media Defensive operations : Protection against attacks Concerned with non-owned and owned resources Offensive operations : Exploit vulnerabilities in information resources Motives, means, opportunities WIN-LOSE NATURE OF OPERATIONS
Background image of page 6
CSCE 727 - Farkas 7 Gain-Loss Nature of IW Gain-Loss Nature of IW defense offense ensure availability prevent availability ensure integrity increase availability decrease availability decrease integrity From: Denning Figure 2.1
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
CSCE 727 - Farkas 8 Activities Activities Play : hackers vs. owners Crime : perpetrators vs. victims Individual rights : individuals vs. individuals/organizations/government National security : national level activities State activities Terrorism
Background image of page 8
CSCE 727 - Farkas 9 Intention of Attackers Intention of Attackers Defensive IW Difficult to guess Determines response and incident handling
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Offensive Information Warfare Offensive Information Warfare
Background image of page 10
CSCE 727 - Farkas 11 Win-Lose Activity Win-Lose Activity Alter availability and integrity of resources to benefit the offense Old vs. new methods Areas: 1. Open source and competitive intelligence 2. Psyops and perception management 3. Insiders threat 4. Signal intelligence 5. Computer attacks (covered in other IA courses) 6. Malicious software (covered in other IA courses)
Background image of page 11

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
12 1 Open Source Intelligence 1 Open Source Intelligence Protected information : readily available in public domain, can be inferred from public data, or deduced from aggregated public data Goal : answer specific question in support of some mission Advantages : no risk for collector, provides context, mode of information acquisition, cover for data discovery by secret operations Disadvantages : may not discover important information, assurance of discovery(?)
Background image of page 12
Image of page 13
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 12/13/2011 for the course CSCE 727 taught by Professor Staff during the Spring '11 term at South Carolina.

Page1 / 41

csce727-summary - Information Warfare Information Summary...

This preview shows document pages 1 - 13. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online