SlideShare a Scribd company logo
1 of 2
Information Operations
: Discuss the concept of Information Operations (IO), as defined
in class and by the US military. Contrast the difference aspects
of IO and explain how it applies and is relevant to
cyberwarfare. Discuss where IO falls within the armed forces
and how it is currently implemented.
Password Hacking
: Explain password hacking and what tools, processes, and
methods we use for this activity. Discuss elements related to
password length, complexity, and how this impacts our ability
to hack the password. Explain legitimate reasons for conducting
password hacking in a corporate environment.
Cyberwarfare Laws
: Explain the need for international laws regarding cyberwarfare
and detail the challenges associated with creating them. Detail
examples from class on cyber-law governance structures that
may be suitable in an international environment (e.g. SALT,
FIVE EYES, and Geneva Conventions). Explain how existing
laws and concepts (e.g
. jus ad bellum
) may not be suitable for cyberwarfare.
Privacy and Anonymity
: Discuss how cyberspace and access to information has
impacted anonymity and privacy. Detail issues such as
intelligence gathering on the internet, development of
anonymity tools (e.g. TOR), Hacktivism, government
transparency, and how they are interrelated. Give examples
from the book and class on how we can improve individual
privacy in the information age.
Option 2
: Contrast ‘complete privacy’ with ‘complete transparency’ and
how these two ideas impact concepts such as freedom of
expression and the right to privacy. Contrast the right to privacy
with the need for law enforcement and intelligence agencies to
have access to information.
Defensive Triad
: Discuss the defensive triad, as defined by Richard Clarke and
in class, and contrast this concept with other information
security concepts (e.g. CIA triad and IoT). Explain in detail the
different elements of the defensive triad and explain how they
provide a foundation for a national approach to cybersecurity.
Details: 5-7 pages (not counting cover page and references),
APA format, cover page, references.

More Related Content

Similar to Information Operations Discuss the concept of Information Opera.docx

Module 8 Textbook ReadingThe textbook reading assignment f.docx
Module 8 Textbook ReadingThe textbook reading assignment f.docxModule 8 Textbook ReadingThe textbook reading assignment f.docx
Module 8 Textbook ReadingThe textbook reading assignment f.docx
gilpinleeanna
 
On How the Darknet and its Access to SCADA is a Threat to National Critical I...
On How the Darknet and its Access to SCADA is a Threat to National Critical I...On How the Darknet and its Access to SCADA is a Threat to National Critical I...
On How the Darknet and its Access to SCADA is a Threat to National Critical I...
Matthew Kurnava
 
I need a to respond #2 below- with at least 150 words and include ci.docx
I need a to respond #2 below- with at least 150 words and include ci.docxI need a to respond #2 below- with at least 150 words and include ci.docx
I need a to respond #2 below- with at least 150 words and include ci.docx
ursabrooks36447
 
BCJ 4385, Workplace Security 1 UNIT IV STUDY GUIDE I.docx
BCJ 4385, Workplace Security 1 UNIT IV STUDY GUIDE I.docxBCJ 4385, Workplace Security 1 UNIT IV STUDY GUIDE I.docx
BCJ 4385, Workplace Security 1 UNIT IV STUDY GUIDE I.docx
JASS44
 
Securing Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay RobertsonSecuring Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay Robertson
Eljay Robertson
 
Links Associated with Privacy Death of privacy ‘Your ce.docx
Links Associated with Privacy Death of privacy ‘Your ce.docxLinks Associated with Privacy Death of privacy ‘Your ce.docx
Links Associated with Privacy Death of privacy ‘Your ce.docx
smile790243
 
HacktivismPaper.docx
HacktivismPaper.docxHacktivismPaper.docx
HacktivismPaper.docx
Desarae Veit
 
Computer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docxComputer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docx
donnajames55
 
Respond with 150 wordMy post Forum Post   Hint swipe t.docx
Respond with 150 wordMy post Forum Post   Hint swipe t.docxRespond with 150 wordMy post Forum Post   Hint swipe t.docx
Respond with 150 wordMy post Forum Post   Hint swipe t.docx
carlstromcurtis
 
Do you agree or disagree with the following responses. If so, why .docx
Do you agree or disagree with the following responses. If so, why .docxDo you agree or disagree with the following responses. If so, why .docx
Do you agree or disagree with the following responses. If so, why .docx
jacksnathalie
 
Laureate Online Education Information Security Engineering .docx
Laureate Online Education Information Security Engineering .docxLaureate Online Education Information Security Engineering .docx
Laureate Online Education Information Security Engineering .docx
DIPESH30
 
ECON 202 Written AssignmentDue April 28th Submitted through Blac
ECON 202 Written AssignmentDue April 28th Submitted through BlacECON 202 Written AssignmentDue April 28th Submitted through Blac
ECON 202 Written AssignmentDue April 28th Submitted through Blac
EvonCanales257
 

Similar to Information Operations Discuss the concept of Information Opera.docx (13)

Module 8 Textbook ReadingThe textbook reading assignment f.docx
Module 8 Textbook ReadingThe textbook reading assignment f.docxModule 8 Textbook ReadingThe textbook reading assignment f.docx
Module 8 Textbook ReadingThe textbook reading assignment f.docx
 
On How the Darknet and its Access to SCADA is a Threat to National Critical I...
On How the Darknet and its Access to SCADA is a Threat to National Critical I...On How the Darknet and its Access to SCADA is a Threat to National Critical I...
On How the Darknet and its Access to SCADA is a Threat to National Critical I...
 
I need a to respond #2 below- with at least 150 words and include ci.docx
I need a to respond #2 below- with at least 150 words and include ci.docxI need a to respond #2 below- with at least 150 words and include ci.docx
I need a to respond #2 below- with at least 150 words and include ci.docx
 
BCJ 4385, Workplace Security 1 UNIT IV STUDY GUIDE I.docx
BCJ 4385, Workplace Security 1 UNIT IV STUDY GUIDE I.docxBCJ 4385, Workplace Security 1 UNIT IV STUDY GUIDE I.docx
BCJ 4385, Workplace Security 1 UNIT IV STUDY GUIDE I.docx
 
Securing Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay RobertsonSecuring Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay Robertson
 
Links Associated with Privacy Death of privacy ‘Your ce.docx
Links Associated with Privacy Death of privacy ‘Your ce.docxLinks Associated with Privacy Death of privacy ‘Your ce.docx
Links Associated with Privacy Death of privacy ‘Your ce.docx
 
HacktivismPaper.docx
HacktivismPaper.docxHacktivismPaper.docx
HacktivismPaper.docx
 
Computer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docxComputer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docx
 
Understanding the Methods behind Cyber Terrorism
Understanding the Methods behind Cyber TerrorismUnderstanding the Methods behind Cyber Terrorism
Understanding the Methods behind Cyber Terrorism
 
Respond with 150 wordMy post Forum Post   Hint swipe t.docx
Respond with 150 wordMy post Forum Post   Hint swipe t.docxRespond with 150 wordMy post Forum Post   Hint swipe t.docx
Respond with 150 wordMy post Forum Post   Hint swipe t.docx
 
Do you agree or disagree with the following responses. If so, why .docx
Do you agree or disagree with the following responses. If so, why .docxDo you agree or disagree with the following responses. If so, why .docx
Do you agree or disagree with the following responses. If so, why .docx
 
Laureate Online Education Information Security Engineering .docx
Laureate Online Education Information Security Engineering .docxLaureate Online Education Information Security Engineering .docx
Laureate Online Education Information Security Engineering .docx
 
ECON 202 Written AssignmentDue April 28th Submitted through Blac
ECON 202 Written AssignmentDue April 28th Submitted through BlacECON 202 Written AssignmentDue April 28th Submitted through Blac
ECON 202 Written AssignmentDue April 28th Submitted through Blac
 

More from lanagore871

·The pamphlet should contain the following·Content and la.docx
·The pamphlet should contain the following·Content and la.docx·The pamphlet should contain the following·Content and la.docx
·The pamphlet should contain the following·Content and la.docx
lanagore871
 
·Quantitative Data Analysis StatisticsIntroductionUnd.docx
·Quantitative Data Analysis StatisticsIntroductionUnd.docx·Quantitative Data Analysis StatisticsIntroductionUnd.docx
·Quantitative Data Analysis StatisticsIntroductionUnd.docx
lanagore871
 
·ResearchEach student will select a medical disorder or c.docx
·ResearchEach student will select a medical disorder or c.docx·ResearchEach student will select a medical disorder or c.docx
·ResearchEach student will select a medical disorder or c.docx
lanagore871
 
·IntroductionQuantitative research methodology uses a dedu.docx
·IntroductionQuantitative research methodology uses a dedu.docx·IntroductionQuantitative research methodology uses a dedu.docx
·IntroductionQuantitative research methodology uses a dedu.docx
lanagore871
 
·Response GuidelinesReply to the posts of two peers in thi.docx
·Response GuidelinesReply to the posts of two peers in thi.docx·Response GuidelinesReply to the posts of two peers in thi.docx
·Response GuidelinesReply to the posts of two peers in thi.docx
lanagore871
 
·Response GuidelinesReply to the posts of two peer.docx
·Response GuidelinesReply to the posts of two peer.docx·Response GuidelinesReply to the posts of two peer.docx
·Response GuidelinesReply to the posts of two peer.docx
lanagore871
 
·Assignment 1 Implications of Health Economic Concepts for Heal.docx
·Assignment 1 Implications of Health Economic Concepts for Heal.docx·Assignment 1 Implications of Health Economic Concepts for Heal.docx
·Assignment 1 Implications of Health Economic Concepts for Heal.docx
lanagore871
 
Week 3 - News StorySeeing is BelievingWhile we can easily bec.docx
Week 3 - News StorySeeing is BelievingWhile we can easily bec.docxWeek 3 - News StorySeeing is BelievingWhile we can easily bec.docx
Week 3 - News StorySeeing is BelievingWhile we can easily bec.docx
lanagore871
 

More from lanagore871 (20)

·The pamphlet should contain the following·Content and la.docx
·The pamphlet should contain the following·Content and la.docx·The pamphlet should contain the following·Content and la.docx
·The pamphlet should contain the following·Content and la.docx
 
·Quantitative Data Analysis StatisticsIntroductionUnd.docx
·Quantitative Data Analysis StatisticsIntroductionUnd.docx·Quantitative Data Analysis StatisticsIntroductionUnd.docx
·Quantitative Data Analysis StatisticsIntroductionUnd.docx
 
·The health communication plan should be expounded upon to resul.docx
·The health communication plan should be expounded upon to resul.docx·The health communication plan should be expounded upon to resul.docx
·The health communication plan should be expounded upon to resul.docx
 
·ResearchEach student will select a medical disorder or c.docx
·ResearchEach student will select a medical disorder or c.docx·ResearchEach student will select a medical disorder or c.docx
·ResearchEach student will select a medical disorder or c.docx
 
·IntroductionQuantitative research methodology uses a dedu.docx
·IntroductionQuantitative research methodology uses a dedu.docx·IntroductionQuantitative research methodology uses a dedu.docx
·IntroductionQuantitative research methodology uses a dedu.docx
 
·Response GuidelinesReply to the posts of two peers in thi.docx
·Response GuidelinesReply to the posts of two peers in thi.docx·Response GuidelinesReply to the posts of two peers in thi.docx
·Response GuidelinesReply to the posts of two peers in thi.docx
 
·Read Side Trip” #2 (page 183) and discuss what forms of in.docx
·Read Side Trip” #2 (page 183) and discuss what forms of in.docx·Read Side Trip” #2 (page 183) and discuss what forms of in.docx
·Read Side Trip” #2 (page 183) and discuss what forms of in.docx
 
·Logical mathematical·Linguistic ·Musical·.docx
·Logical mathematical·Linguistic ·Musical·.docx·Logical mathematical·Linguistic ·Musical·.docx
·Logical mathematical·Linguistic ·Musical·.docx
 
·Response GuidelinesReply to the posts of two peer.docx
·Response GuidelinesReply to the posts of two peer.docx·Response GuidelinesReply to the posts of two peer.docx
·Response GuidelinesReply to the posts of two peer.docx
 
·Identify the pathophysiological mechanisms of inflammatory bowe.docx
·Identify the pathophysiological mechanisms of inflammatory bowe.docx·Identify the pathophysiological mechanisms of inflammatory bowe.docx
·Identify the pathophysiological mechanisms of inflammatory bowe.docx
 
·From the e-Activity, analyze the basis for classifying courts i.docx
·From the e-Activity, analyze the basis for classifying courts i.docx·From the e-Activity, analyze the basis for classifying courts i.docx
·From the e-Activity, analyze the basis for classifying courts i.docx
 
·Discuss the last three decades (1978- present) of China rapid.docx
·Discuss the last three decades (1978- present) of China rapid.docx·Discuss the last three decades (1978- present) of China rapid.docx
·Discuss the last three decades (1978- present) of China rapid.docx
 
·Develop a webinar presentation for staff personnel to support t.docx
·Develop a webinar presentation for staff personnel to support t.docx·Develop a webinar presentation for staff personnel to support t.docx
·Develop a webinar presentation for staff personnel to support t.docx
 
·Describe the clinical presentation of chronic kidney disease..docx
·Describe the clinical presentation of chronic kidney disease..docx·Describe the clinical presentation of chronic kidney disease..docx
·Describe the clinical presentation of chronic kidney disease..docx
 
·Assignment 1 Implications of Health Economic Concepts for Heal.docx
·Assignment 1 Implications of Health Economic Concepts for Heal.docx·Assignment 1 Implications of Health Economic Concepts for Heal.docx
·Assignment 1 Implications of Health Economic Concepts for Heal.docx
 
·Analyze the current uses of HTTP and HTTPS, and predict the fut.docx
·Analyze the current uses of HTTP and HTTPS, and predict the fut.docx·Analyze the current uses of HTTP and HTTPS, and predict the fut.docx
·Analyze the current uses of HTTP and HTTPS, and predict the fut.docx
 
Wrrite  3 pages  about shakespearePlease write it as s.docx
Wrrite  3 pages  about shakespearePlease write it as s.docxWrrite  3 pages  about shakespearePlease write it as s.docx
Wrrite  3 pages  about shakespearePlease write it as s.docx
 
What do the four parts of the Christian Biblical Narrative (i.e.,.docx
What do the four parts of the Christian Biblical Narrative (i.e.,.docxWhat do the four parts of the Christian Biblical Narrative (i.e.,.docx
What do the four parts of the Christian Biblical Narrative (i.e.,.docx
 
Week 3 - News StorySeeing is BelievingWhile we can easily bec.docx
Week 3 - News StorySeeing is BelievingWhile we can easily bec.docxWeek 3 - News StorySeeing is BelievingWhile we can easily bec.docx
Week 3 - News StorySeeing is BelievingWhile we can easily bec.docx
 
The paper must following the formatting guidelines in The Pub.docx
The paper must following the formatting guidelines in The Pub.docxThe paper must following the formatting guidelines in The Pub.docx
The paper must following the formatting guidelines in The Pub.docx
 

Recently uploaded

QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lessonQUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
httgc7rh9c
 
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MysoreMuleSoftMeetup
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
AnaAcapella
 

Recently uploaded (20)

Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
VAMOS CUIDAR DO NOSSO PLANETA! .
VAMOS CUIDAR DO NOSSO PLANETA!                    .VAMOS CUIDAR DO NOSSO PLANETA!                    .
VAMOS CUIDAR DO NOSSO PLANETA! .
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
 
diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....
 
Diuretic, Hypoglycemic and Limit test of Heavy metals and Arsenic.-1.pdf
Diuretic, Hypoglycemic and Limit test of Heavy metals and Arsenic.-1.pdfDiuretic, Hypoglycemic and Limit test of Heavy metals and Arsenic.-1.pdf
Diuretic, Hypoglycemic and Limit test of Heavy metals and Arsenic.-1.pdf
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 
Michaelis Menten Equation and Estimation Of Vmax and Tmax.pptx
Michaelis Menten Equation and Estimation Of Vmax and Tmax.pptxMichaelis Menten Equation and Estimation Of Vmax and Tmax.pptx
Michaelis Menten Equation and Estimation Of Vmax and Tmax.pptx
 
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lessonQUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
 
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Simple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdfSimple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdf
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
dusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningdusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learning
 
How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17
 
How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
 
Introduction to TechSoup’s Digital Marketing Services and Use Cases
Introduction to TechSoup’s Digital Marketing  Services and Use CasesIntroduction to TechSoup’s Digital Marketing  Services and Use Cases
Introduction to TechSoup’s Digital Marketing Services and Use Cases
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.ppt
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 

Information Operations Discuss the concept of Information Opera.docx

  • 1. Information Operations : Discuss the concept of Information Operations (IO), as defined in class and by the US military. Contrast the difference aspects of IO and explain how it applies and is relevant to cyberwarfare. Discuss where IO falls within the armed forces and how it is currently implemented. Password Hacking : Explain password hacking and what tools, processes, and methods we use for this activity. Discuss elements related to password length, complexity, and how this impacts our ability to hack the password. Explain legitimate reasons for conducting password hacking in a corporate environment. Cyberwarfare Laws : Explain the need for international laws regarding cyberwarfare and detail the challenges associated with creating them. Detail examples from class on cyber-law governance structures that may be suitable in an international environment (e.g. SALT, FIVE EYES, and Geneva Conventions). Explain how existing laws and concepts (e.g . jus ad bellum ) may not be suitable for cyberwarfare. Privacy and Anonymity : Discuss how cyberspace and access to information has impacted anonymity and privacy. Detail issues such as intelligence gathering on the internet, development of anonymity tools (e.g. TOR), Hacktivism, government transparency, and how they are interrelated. Give examples from the book and class on how we can improve individual privacy in the information age. Option 2 : Contrast ‘complete privacy’ with ‘complete transparency’ and
  • 2. how these two ideas impact concepts such as freedom of expression and the right to privacy. Contrast the right to privacy with the need for law enforcement and intelligence agencies to have access to information. Defensive Triad : Discuss the defensive triad, as defined by Richard Clarke and in class, and contrast this concept with other information security concepts (e.g. CIA triad and IoT). Explain in detail the different elements of the defensive triad and explain how they provide a foundation for a national approach to cybersecurity. Details: 5-7 pages (not counting cover page and references), APA format, cover page, references.