Information Warfare Midterm Overview Lectures Covered Everything until (including) March 2nd Reading: – All lecture slides – Denning book: Chapters 1, 2, 3, 4, 5, 7, 13 (access control), 14 (Risk management, Incident handling) – Additional reading materials (next slide) CSCE 727 - Farkas 2 Additional reading Familiarity with CSCE 522 lecture notes, 2013 Fall, as needed, http://www.cse.sc.edu/~farkas/csce522-2013/lecture.htm Denning, D. E. Stuxnet: What Has Changed? Future Internet 2012, 4, 672687. (.pdf) Open Source Intelligence: Private Sector Capabilities to Support DoD Policy, Acquisition, and Operations, http://www.fas.org/irp/eprint/oss980501.htm NSA revelations hobble pursuit of a comprehensive cyberdefense initiative, Homeland Security News Wire, 08/16, 2013,http://www.homelandsecuritynewswire.com/dr20130816-nsarevelations-hobble-pursuit-of-a-comprehensive-cyberdefense-initiative Expert calls for “surveillance minimization” to restore public trust, Homeland Security News Wire, 01/27/2014, http://www.homelandsecuritynewswire.com/dr20140127-expertcalls-for-surveillance-minimization-to-restore-public-trust CSCE 727 - Farkas 3 Additional Reading Michael N. Schmitt, Computer Network Attack and the Use of Force in International Law. Thoughts on a Normative Framework., 37 Colum. J. Transnat'l L. 885, 1999,http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA471993 NIST special publications, Incident Handling Updated Guidelines, http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-61r2.pdf (general understanding only) Roger C. Molander, Peter A. Wilson, B. David Mussington, Richard Mesic: What is Strategic Information Warfare?, 1996,http://www.rand.org/content/dam/rand/pubs/monograph_reports/2005/MR661.pdf Information Security Policy - A Development Guide for Large and Small Companies, http://www.sans.org/reading_room/whitepapers/policyissues/informationsecurity-policy-development-guide-large-small-companies_1331 CSCE 727 - Farkas 4 Information Security (INFOSEC) Protection of information against intentional or unintentional unauthorized – Disclosure (confidentiality) – Modification (integrity) – Destruction (availability) Concerned mainly with owned resources CSCE 727 - Farkas 5 Security Tradeoffs Security Functionality COST Ease of Use CSCE 727 - Farkas 6 Information Assurance Information security (prevention) plus – Authenticity and non-repudiation – Detection and reaction capabilities – Additional threats, like perception managements and exploitation of public media Addresses intentional or unintentional threats CSCE 727 - Farkas 7 Information Warfare Addresses only intentional attacks Information in any form and transmitted over any media Defensive operations: – Protection against attacks – Concerned with non-owned and owned resources Offensive operations: – Exploit vulnerabilities in information resources – Motives, means, opportunities WIN-LOSE NATURE OF OPERATIONS CSCE 727 - Farkas 8 Gain-Loss Nature of IW prevent availability ensure integrity ensure availability defense offense increase availability decrease integrity decrease availability From: Denning Figure 2.1 CSCE 727 - Farkas 9 Activities Play: hackers vs. owners Crime: perpetrators vs. victims Individual rights: individuals vs. individuals/organizations/government National security: national level activities – State activities – Terrorism CSCE 727 - Farkas 10 Intention of Attackers Defensive IW Difficult to guess Determines response and incident handling CSCE 727 - Farkas 11 Offensive Information Warfare Win-Lose Activity Alter availability and integrity of resources to benefit the offense Old vs. new methods Areas: 1. Open source and competitive intelligence 2. Psyops and perception management 3. Signal intelligence Not yet covered: 1. Insiders threat 2. Computer attacks 3. Malicious software CSCE 727 - Farkas 13 1 Open Source Intelligence Protected information: readily available in public domain, can be inferred from public data, or deduced from aggregated public data Goal: answer specific question in support of some mission Advantages: no risk for collector, provides context, mode of information acquisition, cover for data discovery by secret operations Disadvantages: may not discover important information, assurance of discovery(?) CSCE 727 - Farkas 14 1 Privacy and Copyright Piracy – Copyright Infringement Acquisition of protected work without the owner’s permission Human perception: not serious crime Significant loss for marketing/manufacturing/owner – Trademark Infringement Intellectual property disputes Domain name disputes CSCE 727 - Farkas 15 2 Psyops and Perception Management Information operations that aim to affect perception of others Goal: influence actions Means: influence emotions, reasoning, decisions Target: individuals, groups, nation, World Censorship – Offensive: denies population access to certain materials – Defensive: protect society from materials that would undermine its culture or governance CSCE 727 - Farkas 16 4 Signal Intelligence Operations that involves interception and analysis of signals across electromagnetic spectrum Intelligence report, criminal investigations, employee monitoring U.S. Federal wiretap restrictions Foreign intelligence Privacy rights CSCE 727 - Farkas 17 Defensive Information Warfare Defensive Information Warfare Protect information resources from attacks Preserve the value of resource or recover lost value Security Policy Methods Response CSCE 727 - Farkas 19 Vulnerability Monitoring Identify security weaknesses Methods: automated tools, human walkthrough, surveillance, audit, background checks Red team: organized group of people attempting to penetrate the security safeguards of the system CSCE 727 - Farkas 20 Incident Handling Not all incidents can be prevented Incident handling – – – – Prevention and preparedness Detection and analysis Containment and recovery Post-incident activity Benefits: – – – – Systematic and appropriate response to incidents Quick response reduce loss and damage Strengthen security Satisfy legal requirements Federal agency requirements CSCE 727 - Farkas 21 Sample tests Posted on class website Will be discussed on March 16, Monday CSCE 727 - Farkas 22