X

Download Information Warfare-The Warriors PowerPoint Presentation

SlidesFinder-Advertising-Design.jpg

Login   OR  Register
X


Iframe embed code :



Presentation url :

Home / Computers & Web / Computers & Web Presentations / Information Warfare-The Warriors PowerPoint Presentation

Information Warfare-The Warriors PowerPoint Presentation

Ppt Presentation Embed Code   Zoom Ppt Presentation

PowerPoint is the world's most popular presentation software which can let you create professional Information Warfare-The Warriors powerpoint presentation easily and in no time. This helps you give your presentation on Information Warfare-The Warriors in a conference, a school lecture, a business proposal, in a webinar and business and professional representations.

The uploader spent his/her valuable time to create this Information Warfare-The Warriors powerpoint presentation slides, to share his/her useful content with the world. This ppt presentation uploaded by itsmark in Computers & Web ppt presentation category is available for free download,and can be used according to your industries like finance, marketing, education, health and many more.

About This Presentation

Information Warfare-The Warriors Presentation Transcript

Slide 1 - 1 Information Warfare:The Warriors
Slide 2 - 2 Overview Information Warriors Who Are They What Do They Do Types of Threat PsyOps Civil Affairs Electronic Warfare Hackers/Crackers Cyber Terror Defenders
Slide 3 - 3 Information Warriors Information Warfare much more than Computer Network Operations (CNO) Psychological Operations Civil Affairs Electronic Warfare Ops Computer Warriors Counter-IW Specialists (Defenders)
Slide 4 - 4 Threats National Security Critical National Infrastructure Cyber-Warfare/Computer Network Operations Cyber Crime Organized Crime Identity Theft Extortion Fraud Non-State Actors Terrorists Political Activists
Slide 5 - 5 Threats Nation States Information Warfare is recognized as a part of military strategy and doctrine around the world The study and practice of military usage of Information Warfare is taught in military academies and educational facilities
Slide 6 - 6 Threats Organized Crime Utilized Information Warfare in various forms for centuries Extortion is a form of Information Warfare New technologies breed new criminals Technology creates trans-national criminal organizations In certain nations, the lines between state actions and organized crime can be blurred
Slide 7 - 7 Transnational Organized Crime Organized crime Hacktivism Insider crime Hackers/ Crackers Cyber-crime
Slide 8 - 8 Example -Transnational Organized Crime Individual crime may be difficult to differentiate from organized crime: Distribution and Coordination tools Mass exploitation methods Organized crime exploits Information technologies Enhanced efficiencies – on-line management of illegal gambling schemes Intelligence tool for risk management - Cali organization in 1995 had state of the art equipment Force multiplier – GPS for sea drops New channels and new targets for crime
Slide 9 - 9 Threats Non-State Actors Terrorists Hacktivists Sometimes different sides of the same page As with organized crime, sometimes the lines between state and non-state actors is blurred
Slide 10 - 10 Example - Hacker to Terrorism? Defaced Health-care web site in India "This site has been hacked by ISI (Kashmir is ours), we want a hospital in Kashmir" and signed by Mujahideen-ul-dawat Linked to G-Force Pakistan Global Hactivism linked to Mid-East conflict Information Warfare successfully utilized in Chiapas conflict with Mexican gov’t
Slide 11 - 11 Examples - Cyber-Intifada Prolonged campaign Palestinian hackers/web defacers Targeting Israeli and Israel-supporting organizations Low innovation level Counter-campaigns Publicity Counter-hacking: 2xS.co.il Recent resurgence?
Slide 12 - 12 The Warriors Sociology of warriors Morale Vigilance vs. assumed invulnerability Organization Motivation of warriors Accountability vs. anarchy Delayed vs. immediate gratification Internal vs. external gratification Preparation of warriors Training Tool selection Intelligence Strategy
Slide 13 - 13 The Warriors Psychological Operations Warriors Specialize in using information warfare to change an enemy’s state of mind Propaganda (Not limited to PsyOps) Non-threatening Threatening Computer Network Operations Goal is to eliminate confidence Impacts decision-making and C2
Slide 14 - 14 The Warriors Civil Affairs Winning the Hearts and Minds! Essential to military operations Utilizes Information Warfare strategies to calm and utilize populations Specialists must understand subtleties of language and culture Research begins long before the battle Operations last long after the battle is won
Slide 15 - 15 The Warriors Electronic Warfare Ops Goal is to utilize electronic information infrastructure against your enemy Information lost or modified Make the enemy blind, deaf, and dumb Restrict or control electronic information sources
Slide 16 - 16 The Warriors Computer Warriors Computer Network Operations Offensive attacks against enemy information/computer networks Utilization of sophisticated attack tools and malware Newest form of Information Warfare Principles are the same
Slide 17 - 17 Attack Sophistication vs.Intruder Technical Knowledge High Low password guessing self-replicating code password cracking exploiting known vulnerabilities disabling audits back doors hijacking sessions sweepers sniffers packet spoofing GUI automated probes/scans denial of service www attacks Tools Attackers Intruder Knowledge Attack Sophistication “stealth” / advanced scanning techniques burglaries network mgmt. diagnostics distributed attack tools Cross site scripting Stagedattack Time
Slide 18 - 18 Examples - Response Time to CNO Conficker 2009?
Slide 19 - 19 Cyber Terrorism Cyberterror is still emerging No verified example of cyber terror attack to date Evolving threat Integrating critical missions with general Internet Increasing damage/speed of attacks Continued vulnerability of off-the-shelf software Much confusion of descriptions and definitions Technology widely viewed as critical weakness of Western nations
Slide 20 - 20 Defenders Highly trained specialists Part detective, intelligence analyst, technologist, and bad guy Red Teams/Tiger Teams Vulnerability / Risk Analysts Intrusion Response Teams
Slide 21 - 21 Defense Flow
Slide 22 - 22 Intrusion Response teams Types: Automated Local dedicated or volunteer team Contracted team Why? Single-point of contact for fast response Provide for consistent response Provide for collateral relationships Problems: Resources Authorization to act Trust
Slide 23 - 23 Summary Information Warriors are the same as warriors have always been Utilize different weapon Long-bow or Computer? Have to react faster Aircraft or Data packets? New skills Hand-to-Hand or Computer Network Operations?
Slide 24 - 24 Summary Increasingly diverse threat Ongoing challenge to track, trend, pursue Who may be as important as what
Slide 25 - 25 References http://www.cert.org InfoWar: http://www.iwar.org.uk/index.htm http://infowar.freeservers.com/index.html http://www.nmrc.org/links/ Culture: http://www.eff.org/pub/Net_culture/ Terrorism: http://www.terrorism.com/terrorism/links.shtml Books : Sterling - The Hacker Crackdown Stoll - The Cuckoo’s Egg Honeynet Project – Know Your Enemy Schneier – Beyond Fear