23C3 - 1.5
23rd Chaos Communication Congress
Who can you trust?
Referenten | |
---|---|
Sebastian Schroeder |
Programm | |
---|---|
Tag | 1 |
Raum | Saal 3 |
Beginn | 17:15 |
Dauer | 01:00 |
Info | |
ID | 1439 |
Veranstaltungstyp | Vortrag |
Track | Science |
Sprache | englisch |
Feedback | |
---|---|
Haben Sie diese Veranstaltung besucht? Feedback abgeben |
Information Operations
Sector-Oriented Analysis of the Potential Impact and Possible Countermeasures
The use of information technology has brought a lot of new functionality and efficiency with it. But due to the fact that enterprises are totally dependant on IT, they are vulnerable to theft or destruction of information assets, a process described as information operations. This is the presentation of a one-year Postgraduate Infosec Research Project conducted in New Zealand.
This presentation gives a sector-oriented overview of what has been done so far to address information operations (IO) and where improvements could and should be made. Main threat sources were identified: malicious insiders, as well as competitive organizations, cyber terrorists, criminal groups, and foreign governments. The research analyzes the potential risks of IO, clarifies how organizations are prepared for IO, and demonstrates how IO threats are addressed. Miscellaneous IO weapons, trends, threats, and possible countermeasures will be discussed.
IO involves much more than computers and computer networks. It encompasses information in any form and transmitted over any medium. It covers operations against information content and operations against supporting systems, including hardware, software, and human practices. Numerous definitions of IO and related topics exist. When trying to define IO there is a danger of defining the concept either too narrowly or too broadly. Because they are commonly in use, definitions of the DOD Dictionary of Military and Associated Terms will be used:
- Information Operations: Actions taken to affect adversary information and information systems while defending one’s own information and information systems.
- Information Warfare: IO conducted during time of crisis or conflict to achieve or promote specific objectives over a specific adversary or adversaries.
Links
- Cyberspace & Information Operations Study Center
- Information Warfare Tutorial
- Journal of Information Warfare
- Cyber Terrorism and Information Warfare: Academic Perspectives: Cryptography
- National Academy of Sciences: Trust in Cyberspace
- Canadian Security Intelligence Service on Information Operations
- Center for Information Technology Integration: Cyber Security and Information Infrastructure Protection
- Publications: Cyberterrorism & Computer Technology
- Wired News: U.S. Military's Elite Hacker Crew