Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Information Warfare

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 16

INFORMATION WARFARE

DONE BY: ANU - A177158821015 – M.TECH (DEFENCE TECHNOLOGY) - AIDT


CONTENTS
 WHAT IS IW INFORMATION ATTACK

 HISTORY OF IW  CONDUCTING AN INFORMATION


ATTACK
 BOISOT’S MODEL
 IW SIGNIFICANCE IN THE
MILITARY
 IW FUNDAMENTALS

 CONCLUSION
 STRATEGIES USED IN IW
 FRAMEWORK FOR AN
 REFERENCES
WHAT IS IW

Manipulate information without the


victim’s awareness.

Management of ICT for competitive


advantage.
HISTORY OF IW

Gulf War of 1991

Emphasis was still on the technology


rather than the information itself.
DATA
“things”
BOISOT’S MODEL
DATA: Describes attribute of things.

INFORMATION
KNOWLEDGE: Mindset about data
achieved by an event and attributes of
the agent.

KNOWLEDGE
INFORMATION: Data filtered by the
“agent” agent within bounds of the knowledge of
the agent.
IW FUNDAMENTALS

I. FORCE

II. DECEPTION
STRATEGIES USED IN IW

DEGRADED
DATA INFORMATIO KNOWLEDGE
N

DEN STEA REINF CHAN CHANG


Y L ORCE GE E
MANIPU DEST ILLUSI CONT PERCEP
LATE ROY ON EXT TION
STRATEGIES USED IN IW

Brute Force Attacks – Not Subtle so requires less reinforcement


Deceptive Attacks – Subtler so requires continual reinforcement

Deprive an adversary of data while exploiting one’s own data.


FRAMEWORK FOR AN INFORMATION ATTACK

TRANPO
RTERS
CONTAI SENSO
NERS INFORM RS
ATION
SYSTEM
RECORDE PROCESS
RS ORS
CONDUCTING AN INFORMATION ATTACK
Manipulation of Information

Interception of Information

Disruption of Information Flows

Slowing of Information Flows


CONDUCTING AN INFORMATION ATTACK
Destruction of the Source

Providing Incorrect Data or Invalid Output

Exposing Confidential/Sensitive Information

Use of Malicious Code


IW SIGNIFICANCE IN THE
MILITARY
3 New Revolutions in Military Affairs:

Cyberattacks

Autonomous Robots

Communication Management
IW SIGNIFICANCE IN THE
MILITARY
3 Primary Weapons in the Military
Cyberspace:

Network-Centric Warfare

C4ISR

C5ISR
CONCLUSION

Advancements in Communications Management

Faster Dissemination of Information

Newer methods of Information Warfare


REFERENCES
• Vailliant, Bethany, "Russian Information Warfare: Implications for Deterrence
Theory", Strategic Studies Quarterly, 2018
 "Information Warfare: What and How?", www.cs.cmu.edu, Retrieved 2019-
10-20
 Hutchinson, M. Warren, “Concepts in information warfare” in Information
Warfare: Corporate Attack and Defence in a Digital World, Oxford, Elsevier,
2001, ISBN, 0750649445
• W. Hutchinson, “Information Warfare and Deception”, Informing Science, Vol 9,
2006
THANK YOU!

You might also like