SlideShare a Scribd company logo
INFORMATION WARFARE,
ASSURANCE AND SECURITY:
THE ENERGY SECTOR
PERSPECTIVESAdedayo O.S
CSO EIS Department
Information Warfare, Assurance and Security 1
A paper delivered during the Energy Information
System (EIS) departmental Seminar, March,
2013 at Computer Training room, ECN Abuja
Information Warfare, Assurance and Security 2
1. Introduction
2. Definitions
3. Types of Information Warfare
4. Security Measures
5. Impact of Information Warfare
6. Vulnerability Scanners/Tools
7. Conclusion
1.0 Introduction
Computers now control the
electric power,
telecommunication systems,
aviation systems and the financial
sector. Medical, business, criminal
and other vita records are now
stored on the computer systems
(National Research Council, 1991).
Information Technology has
brought a lot changes to the way
warfare are being wage today, a
great number of the national
infrastructures in the developed
nation greatly depend on IT.
The economic, social, political,
educational, power and other
activities depend on Information
Technology .
Information Warfare, Assurance and Security 3
Electric Power Grid System
Information Warfare, Assurance and Security 4
Internet
1.0 Introduction (cont’d)
Internet is now a very
powerful tool for trade,
national and financial
development, it is the
largest computer network in
the world comprising of
smaller networks, forming
the backbone for data
transmission across the
whole world because of the
level of its great
redundancy. (SecurityFocus,
2008).
Information Warfare, Assurance and Security 5
Information Warfare in Energy Sectors
Examples
 In June 2007, the Department of Homeland Security (DHS) leaked a video
that showed how researchers launched a simulated attack that brought down
a diesel electrical generator, leaving it coughing in a cloud of smoke, through
a remote hack that was dubbed the Aurora vulnerability.
 In January 2008, a CIA analyst revealed that a number of cyber attacks had cut
power to several cities outside the U.S.
 In May 2008, the Government Accountability Office (GAO) issued a scathing
report on the number of security vulnerabilities at the Tennessee Valley
Authority, the nation’s largest public power company.
 In April 2009, The Wall Street Journal reported, according to unnamed
current and former national security officials, that Russian and Chinese
attackers penetrated the U.S. power grid, installing malware that could
potentially be used to disrupt delivery.
 In July 2009, NERC CSO Michael Assante told the House subcommittee on
Emerging Threats, Cyber security, and Science and Technology, “Cyber
threats to control systems are
Information Warfare, Assurance and Security 6
1.0 Introduction (cont’d)
Today, information war and
cyber-war cover wide area of
conflict types ranging from
economic, social, political,
and civilian to military
scopes. Cyber warfare is
generally referred to as the
use of information
technology devices to wedge
war in a communication
medium.
Information Warfare, Assurance and Security 7
1.0 Introduction (cont’d)
Cyber criminals now targets
national infrastructures, such
as public electricity system,
transportation, energy, oil and
gas system, finance and
banking system, mass media,
and military command and
control (Wik, 2000).
Information Warfare, Assurance and Security 8
The impact of the information warfare and its
associated risk is very high based on the incident
reports to Computer Emergency Response Team
Coordination Center (CERT/CC) (CERT Statistics,
2009).
1.0 Introduction (cont’d)
Computers now controls most of the civilian and
military infrastructure, including communication,
power systems, and over two million computers are
being used by the military (Melnick, 2007).
Libicki (1995) stated, information warfare is a military
word which can be categorized into;
Psychological warfare, intelligence-based warfare,
Electronic warfare, cyber-warfare, hacker warfare,
Command and control warfare, and economic
information warfare
Information Warfare, Assurance and Security 9
1.1 Characteristics of Cyber war
Target exist in Cyberspace with real impact
Telecommunication
Computer Network
Control Network
Weapons
Malicious Software
Electromagnetic pulse (EMP) Weapons
Data manipulation and destruction
Techniques
Virtual destruction of target in the cyberspace
Disabling of system software
Overwhelming of control system
Information Warfare, Assurance and Security 10
1.1 Characteristics of Cyber war
(cont’d)
Capital required is small for large impact
Physical risk associated is Low for the cyber criminal
Role of media is moderate
Legal factor are ill-defined
Physical presence not required for successful attack
(boundary less)
Attack can have any effects focused or diffused
Treat created are in the virtual and physical
Information Warfare, Assurance and Security 11
2.0 Definitions of Information
Warfare
Haeni (1997) define IW as; “Actions taken to achieve
information superiority by affecting adversary information,
information-based processes, information systems, and
computer-based networks while defending one's own
information, information-based processes, information
systems, and computer-based networks”.
Other definition used include, “Cyberwar refers to
conducting, and preparing to conduct, military operations
according to information-related principles.” (Arquilla &
Ronfeldt, 1997)
The word Netwar was used by refers to information-
related conflict at a grand level between nations or
societies” (Arquilla & Ronfeldt, 1997)
Information Warfare, Assurance and Security 12
2.1 Information Warfare Conflicts
Information Warfare, Assurance and Security 13
2.2 Classification Of Information
Warfare
Information Warfare, Assurance and Security 14
3.0 Types of Information
Warfare
Offensive
Information
Warfare
Defensive
Information
Warfare
Passive
Information
Warfare
Information Warfare, Assurance and Security 15
3.1 Offensive Information
Warfare
This is define as taking full control of the enemy’s
information, computer and control systems using
information weapons. Offensive Weapons include:
computer virus, logic bombs, worms, Trojan horses,
back doors, trap doors, chipping, electronic jamming,
HERF guns, Nano machines, and microbes (Haeni,
1997).
The tools can be in form of software code or hardware
device with ability to perform dangerous operation,
which can cause partial or total breakdown of the
enemy’s computer system, infrastructure or networks.
16Information Warfare, Assurance and Security
3.2 Defensive Information
Warfare
The main security measures employed in defensive
Information warfare are physical security, electronics
countermeasure and encryption methods. Hence
protecting system availability and data confidentiality
are very important. (Kaomea, n.d). Countermeasures
used in modern day Information warfare are intrusion
detector systems, antivirus software, encryption,
vulnerability scanners and security analysis software
(Hrovat, 2001).
17Information Warfare, Assurance and Security
3.3 Passive Information Warfare
Passive weapons are harmless, consisting of
surveillance equipment used in information warfare,
an example is during the building of the U.S. Embassy
in Moscow in the 1980s, when the Soviet workers
buried thousands of electronic diodes into the concrete
slabs for the purpose of secret surveillance. This
weaponry does not leave any trace or harmful effect on
the victims. (Schwartau, 1996)
18Information Warfare, Assurance and Security
3.4 Information Weaponries
A virus is a code fragment that copies itself into a
larger program, modifying that program. A virus
executes only when its host program begins to run.
The virus then replicates itself, infecting other
programs as it reproduces. (Russell & Gangemi, 2006)
A worm is an independent program. It reproduces by
copying itself in full-blown fashion from one
computer to another, usually over a network. Unlike a
virus, it usually doesn't modify other programs.
(Russell & Gangemi, 2006)
19Information Warfare, Assurance and Security
3.4 Information Weaponries
A Trojan horse is a code fragment that hides inside a
program and performs a disguised function. It's a
popular mechanism for disguising a virus or a worm
(Russell & Gangemi, 2006)
A bomb is a type of Trojan horse, used to release a
virus, a worm or some other system attack. It's either
an independent program or a piece of code that's been
planted by a system developer or programmer. (Russell
& Gangemi, 2006)
Surveillance system, satellites systems, Signals and
Human Intelligence(C4ISR and IW, n.d)
20Information Warfare, Assurance and Security
3.4 Information Weaponries
(cont’d)
A trap door, or a back door, is a mechanism that's
built into a system by its designer. The function of a
trap door is to give the designer a way to sneak back
into the system, circumventing normal system
protection. (Russell & Gangemi, 2006)
Chipping is a process of implanting tiny electronics
chip into hardware to perform an unexpected function
by the manufacturer. The function include sending
radio signal to a specific location, total breakdown and
unexpected performance when remotely triggered by a
specific frequency signal (Haeni, 1997).
21Information Warfare, Assurance and Security
3.4 Information Weaponries (cont’d)
Nano machine and Microbes; this are special bred
of micro organism and tiny robots with ability to
destroy integrated circuits, computer system ,
buildings or completely shutdown systems
Electronic jamming are used to destruct
communication signals or overshadow signal with
incorrect information to deceive the audience
High Energy Radio Frequency( HERF) gun and
Electro Magnetic Pulse (EMP) bomb are used to
shutdown electronic devices or completely destroy it
(Haeni, 1997).
22Information Warfare, Assurance and Security
4.0 Information Security
Measures
Protective measure used by civilian security practitioners
are redundancy, alternative procedure and emergency
plans (Wik, 2000).
Implementing security policy and guidelines, proper
allocation of all resources and training (Wik, 2000).
Access control through the installation of intrusion
detector , vulnerability scanners ,firewall systems and
network security analyzer (Hrovat, 2001).
Information confidentiality, integrity and availability
measure through user authentication, encryption, and
installation of antivirus and Internet security software.
(Uchida, Sugano, & Andou, 2006).
Information Warfare, Assurance and Security 23
4.1 Encryption Programs
Currently, various types of encryption programs are
being design and used to transmit information securely
on the information superhighways by the civilians.
 The rapid rate of development of encryption now
support the use of strong, powerful encryption to
protect private, public communications network and
their data storage. There are now better products
offering 128bit and 256 bit encryptions making the
illegal and unauthorized decryption of transmitted
information more difficult (Littleton, 1995).
24Information Warfare, Assurance and Security
4.2 Secure Digital Communication
Modern technology in digital communication
has brought a lot of improvement in
information in terms encryption as a way of
reducing security risk. The new communication
utilized digital signatures, thereby preventing
unauthorized interception, preserving the
confidentiality and integrity of data (Littleton,
1995). Random encryption is used each time the
phone is used making guessing the right key to
decrypt the signal difficult (Littleton, 1995).
25Information Warfare, Assurance and Security
4.3 Redundant Management
Systems
In attempt to reduce security risk, the use of redundant
management systems is employed as way of quick recovery
from information security attacks (Littleton, 1995).
Redundancy is defined as the ability of certain components
of a system to assume functions of failed components
without adversely affecting the performance of the system
itself (Matalus & Fiering, 1977).
Building of redundancy in communication path and
backing up of all information systems resources is being
used by cooperate organization to mitigate risk of system
failure since it is rare to attack all the systems at a time.
26Information Warfare, Assurance and Security
5.0 Impact of Information
Warfare on Energy Sector
One the major responsibility is to “to win the
information war” stated, in the National Military
strategy of the United States of February 1995
(DeVries, 1997).
Most Energy power systems and national economy
depends greatly only the national information
infrastructures due to its automated and network
dependent nature. As a result, the national
information infrastructures is the centre of all
information warfare attack and it depends largely on
electric power, computers and telecommunication
(Wik, 2000).
27Information Warfare, Assurance and Security
National Information Infrastructures
Information Warfare, Assurance and Security 28
ELECTRIC
POWER
TELECOM
COMPUTERS
5.1 Impact of Information
Warfare on Private Sector
The world today had moved from agrarian to
industrial and finally to information wave. The
most industrial nation’s economy greatly depends
on information technology (Knapp & Boulton,
2006).
Computers now control the electric power,
telecommunication systems, aviation systems and
the financial sector. Medical, business, criminal
and other vital records are now stored on the
computer systems (National Research Council,
1991). Information Warfare, Assurance and Security 29
5.1 Impact of Information
Warfare on Private Sector cont’d
Since 1994, when hackers attacks military, civilian and
government organizations through the Griffiss Air Force base
computers. The major target of cyber terrorist have being on
the civilian firms, commercial firms and infrastructures.
(Strassmann, 2001).
Corporate espionage rate is rapidly increasing due to the
current corporate competition, modern development in IT and
miniaturization of digital devices and opening of internal
network which make more information available for both the
workers and vendors (Knapp & Boulton, 2006).
Information Warfare, Assurance and Security 30
6.0 Vulnerability
Scanners/Tools
Some of the information weaponries used by the military and civilian
security practitioners to acquire knowledge about their organizational
strategies and plans and security measures to reduce information risks are :
 Network Visualisation, Monitors and Sniffers softwares. Like Visio, NetViz,
NetPartitioner, NeoTrace, TraceRoute, Ethload, Net Xray, Etherpeak,
TCPDump, Snoop, IPWatcher, T-sight and Scott/Tkined
 Vulnerability Analysis software. Like ISS Internet Scanner, Kane Security
Analyst, Trident IP Toolbox / L3 Expert, Security Profile Inspector (SPI), SNI
Ballista and SATAN
 Intrusion detection software. Like RealSecure, NetRanger, Stalker/CyberCop,
Intruder Alert, Network Flight Recorder, SHADOW and NIDS
 Exploitation software. Like NTSecurity, RootShell, Offline NT Password
Utility, Lopht Heavy Industries, AntiOnline, Insecure/Fyodor , TCPwrappers,
Tripwire, COPS, crack, LophtCrack and ScanNT
Information Warfare, Assurance and Security 31
7.0 Conclusion
The increasing over dependency of our economy and
infrastructures on IT system created a high level of
security risks resulting from inexpensive cost of cyber
attacks is of great concerns to both the public, private
and military sectors. Information warfare is a two
edged sword, a country capable of waging IW is also
very vulnerability. Currently, security treat are more
then the solution we have and the cost of preventing
information warfare is far beyond the cost of the
attack. It is therefore necessary for the government
and agency in the energy sector to be more
committed and defensive.
Information Warfare, Assurance and Security 32
References
Adams, J. (2001). Virtual Defense. Retrieved from Foreign Affairs: http://www.foreignaffairs.com/articles/57037/james-adams/virtual-defense
Arquilla, J. & Ronfeldt, D. (1997). Retrieved from http://www.rand.org/pubs/reprints/2007/RAND_RP223.pdf
Brazzoli, S. M. (2007). Future prospects of information warfare and particularly psychological operations. . Retrieved from
http://www.iss.org.za/uploads/SA2020CHAP13.PDF
Bush, G. W. (2003). National Strategy to Secure Cyberspace. Retrieved from http://www.whitehouse.
C4ISR and Information Warfare. Naval Weapons Systems. (n.d). Retrieved from http://www.owlnet.rice.edu/~nava201/presentations/Lecture19.ppt
DeVries, A. (1997). Information Warfare and Its Impact on National Security (U). Retrieved from http://www.dtic.mil/cgi-bin/GetTRDoc?
Location=U2&doc=GetTRDoc.pdf&AD=ADA325003
Haeni, R. E. (1997). Information Warfare an Introduction. Retrieved from http://www.trinity.edu/rjensen/infowar.pdf
Hrovat, E. (2001). Information Warfare: The Unconventional Art In A Digital World. Retrieved from
http://www.sans.org/reading_room/whitepapers/warfare/information-warfare-unconventional-art-digital-world_787
Kaomea, P. (n.d.). Beyond Security: A Data Quality Perspective on Defensive Information Warfare. Retrieved from
http://mitiq.mit.edu/iciq/Documents/IQ%20Conference%201996/Keynote%20and%20Lunch%20Speeches/Beyond%20Security.pdf
Kelsey, J. T. (2008). Hacking into International Humanitarian Law: The Principles of Distinction and Neutrality in the Age of Cyber Warfare.
Retrieved from http://proxy1.ncu.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=bsh&AN=32010233&site=ehost-
live
Information Warfare, Assurance and Security 33
Knapp, K. J., & Boulton, W. R. (2006). Cyber-warfare Threatens Corporations: Expansion into Commercial Environments. Information
Systems Management. Retrieved from http://proxy1.ncu.edu/login?url=http://search.ebscohost.com/login.aspx?
direct=true&db=bsh&AN=20025701&site=ehost-live
Melnick, J. (2007). The cyberwar against the United States. Retrieved from
http://www.boston.com/news/globe/editorial_opinion/oped/articles/2007/08/19/the_cyberwar_against_the_united_states/
Nunes, P. F. (2001). The Impact of New Technologies in the Military Arena: Information Warfare. Retrieved from
http://www.iwar.org.uk/iwar/resources/technology/nunes.htm
Peters, D. (2009). Intercontinental Replaces ATM Cards with Verve Chip. Retrieved from
http://businessworldng.com/web/articles/79/1/Intercontinental-Replaces-ATM-Cards-with-Verve-Chip/Page1.html
Research Council National. (1991). Computers at Risk. Washington D.C: National Academy Press.
SecurityFocus. (2008). Retrieved from http://www.securityfocus.com/glossary/I
Strassmann, P. A. (2001). Government Should Blaze Global Information Warfare Trails. . Retrieved from http://www.strassmann.
com/pubs/searchsecurity/2001-8.php.
Thom, M. (n.d). Information Warfare Capabilities and Policy Issues. Retrieved from http://www2.fiu.edu/~apodaca/Information
%20Warfare%20Lecture.ppt
Uchida, K. Sugano, N. & Andou, S. (2006). Information Security Solutions. Retrieved from
http://www.fujitsu.com/downloads/MAG/vol43-2/paper04.pdf
Wik, M. W. (2000). Revolution in Information Affairs: Tactical and Strategic Implications of Information Warfare and Information
Operations. Retrieved from http://ics.leeds.ac.uk/papers/pmt/exhibits/812/wik.pdf
Information Warfare, Assurance and Security 34
THANK YOU
Information Warfare, Assurance and Security 35

More Related Content

What's hot

Information security in todays world
Information security in todays worldInformation security in todays world
Information security in todays worldSibghatullah Khattak
 
Cybersecurity Risks for Businesses
Cybersecurity Risks for BusinessesCybersecurity Risks for Businesses
Cybersecurity Risks for BusinessesAlex Rudie
 
Threat analysis-perception
Threat analysis-perceptionThreat analysis-perception
Threat analysis-perceptionzaffar abbasi
 
Customer information security awareness training
Customer information security awareness trainingCustomer information security awareness training
Customer information security awareness trainingAbdalrhmanTHassan
 
The Art of Cyber War: Cyber Security Strategies in a Rapidly Evolving Theatre
The Art of Cyber War:  Cyber Security Strategies in a Rapidly Evolving TheatreThe Art of Cyber War:  Cyber Security Strategies in a Rapidly Evolving Theatre
The Art of Cyber War: Cyber Security Strategies in a Rapidly Evolving TheatreRadware
 
Information System Security
Information System Security Information System Security
Information System Security Syed Asif Sherazi
 
Lecture 1-Technology, Innovation and Modern War
Lecture 1-Technology, Innovation and Modern WarLecture 1-Technology, Innovation and Modern War
Lecture 1-Technology, Innovation and Modern WarStanford University
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information securityDhani Ahmad
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to CybersecurityAdri Jovin
 
Technology and changing nature of warfare
Technology and changing nature of warfareTechnology and changing nature of warfare
Technology and changing nature of warfareandeedalal
 
Phishing simulation exercises
Phishing simulation exercisesPhishing simulation exercises
Phishing simulation exercisesJisc
 
Introduction to Cybersecurity Fundamentals
Introduction to Cybersecurity FundamentalsIntroduction to Cybersecurity Fundamentals
Introduction to Cybersecurity FundamentalsToño Herrera
 
The difference between Cybersecurity and Information Security
The difference between Cybersecurity and Information SecurityThe difference between Cybersecurity and Information Security
The difference between Cybersecurity and Information SecurityPECB
 
Cyber Warfare 4TH edition
Cyber Warfare 4TH editionCyber Warfare 4TH edition
Cyber Warfare 4TH editionJorge Sebastiao
 
Cyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreCyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreJamie Moore
 
Raising information security awareness
Raising information security awarenessRaising information security awareness
Raising information security awarenessTerranovatraining
 
Cyberwar threat to national security
Cyberwar  threat to national securityCyberwar  threat to national security
Cyberwar threat to national securityTalwant Singh
 
Cyber threats landscape and defense
Cyber threats landscape and defenseCyber threats landscape and defense
Cyber threats landscape and defensefantaghost
 

What's hot (20)

Information security in todays world
Information security in todays worldInformation security in todays world
Information security in todays world
 
Cybersecurity Risks for Businesses
Cybersecurity Risks for BusinessesCybersecurity Risks for Businesses
Cybersecurity Risks for Businesses
 
Threat analysis-perception
Threat analysis-perceptionThreat analysis-perception
Threat analysis-perception
 
Customer information security awareness training
Customer information security awareness trainingCustomer information security awareness training
Customer information security awareness training
 
The Art of Cyber War: Cyber Security Strategies in a Rapidly Evolving Theatre
The Art of Cyber War:  Cyber Security Strategies in a Rapidly Evolving TheatreThe Art of Cyber War:  Cyber Security Strategies in a Rapidly Evolving Theatre
The Art of Cyber War: Cyber Security Strategies in a Rapidly Evolving Theatre
 
Information System Security
Information System Security Information System Security
Information System Security
 
Lecture 1-Technology, Innovation and Modern War
Lecture 1-Technology, Innovation and Modern WarLecture 1-Technology, Innovation and Modern War
Lecture 1-Technology, Innovation and Modern War
 
Mobile security
Mobile securityMobile security
Mobile security
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
Understanding cyber resilience
Understanding cyber resilienceUnderstanding cyber resilience
Understanding cyber resilience
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to Cybersecurity
 
Technology and changing nature of warfare
Technology and changing nature of warfareTechnology and changing nature of warfare
Technology and changing nature of warfare
 
Phishing simulation exercises
Phishing simulation exercisesPhishing simulation exercises
Phishing simulation exercises
 
Introduction to Cybersecurity Fundamentals
Introduction to Cybersecurity FundamentalsIntroduction to Cybersecurity Fundamentals
Introduction to Cybersecurity Fundamentals
 
The difference between Cybersecurity and Information Security
The difference between Cybersecurity and Information SecurityThe difference between Cybersecurity and Information Security
The difference between Cybersecurity and Information Security
 
Cyber Warfare 4TH edition
Cyber Warfare 4TH editionCyber Warfare 4TH edition
Cyber Warfare 4TH edition
 
Cyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreCyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece Moore
 
Raising information security awareness
Raising information security awarenessRaising information security awareness
Raising information security awareness
 
Cyberwar threat to national security
Cyberwar  threat to national securityCyberwar  threat to national security
Cyberwar threat to national security
 
Cyber threats landscape and defense
Cyber threats landscape and defenseCyber threats landscape and defense
Cyber threats landscape and defense
 

Similar to Information warfare, assurance and security in the energy sectors

CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITYCYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITYTalwant Singh
 
Systemic cybersecurity risk
Systemic cybersecurity riskSystemic cybersecurity risk
Systemic cybersecurity riskblogzilla
 
Cyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responsesCyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responsesblogzilla
 
Francesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityFrancesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityAndrea Rossetti
 
IT8073_Information Security_UNIT I _.pdf
IT8073_Information Security_UNIT I _.pdfIT8073_Information Security_UNIT I _.pdf
IT8073_Information Security_UNIT I _.pdfAsst.prof M.Gokilavani
 
IT8073 _Information Security _UNIT I Full notes
IT8073 _Information Security _UNIT I Full notesIT8073 _Information Security _UNIT I Full notes
IT8073 _Information Security _UNIT I Full notesAsst.prof M.Gokilavani
 
Cyber Security – Indian Perspective.pptx
Cyber Security – Indian Perspective.pptxCyber Security – Indian Perspective.pptx
Cyber Security – Indian Perspective.pptxSharifulShishir
 
Understanding the Methods behind Cyber Terrorism
Understanding the Methods behind Cyber TerrorismUnderstanding the Methods behind Cyber Terrorism
Understanding the Methods behind Cyber TerrorismMaurice Dawson
 
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...National Critical Information Infrastructure Protection Centre (NCIIPC): Role...
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...Cybersecurity Education and Research Centre
 
Peripheral Review and Analysis of Internet Network Security
Peripheral Review and Analysis of Internet Network SecurityPeripheral Review and Analysis of Internet Network Security
Peripheral Review and Analysis of Internet Network SecurityIJRES Journal
 
Battlefield Cyberspace: Exploitation of Hyperconnectivity and Internet of Things
Battlefield Cyberspace: Exploitation of Hyperconnectivity and Internet of ThingsBattlefield Cyberspace: Exploitation of Hyperconnectivity and Internet of Things
Battlefield Cyberspace: Exploitation of Hyperconnectivity and Internet of ThingsMaurice Dawson
 
AN EMPIRICAL STUDY ON CYBER SECURITY THREATS AND ATTACKS
AN EMPIRICAL STUDY ON CYBER SECURITY THREATS AND ATTACKSAN EMPIRICAL STUDY ON CYBER SECURITY THREATS AND ATTACKS
AN EMPIRICAL STUDY ON CYBER SECURITY THREATS AND ATTACKSDaphne Smith
 
The Future of National and International Security on the Internet
The Future of National and International Security on the InternetThe Future of National and International Security on the Internet
The Future of National and International Security on the InternetMaurice Dawson
 
Cyber Security Intelligence
Cyber Security IntelligenceCyber Security Intelligence
Cyber Security Intelligenceijtsrd
 
Cybercrime and data sharing
Cybercrime and data sharingCybercrime and data sharing
Cybercrime and data sharingblogzilla
 
A Review of Information Security Issues and Techniques.pdf
A Review of Information Security  Issues and Techniques.pdfA Review of Information Security  Issues and Techniques.pdf
A Review of Information Security Issues and Techniques.pdfArlene Smith
 
Gebm os presentation final
Gebm os presentation finalGebm os presentation final
Gebm os presentation finalsunnyjoshi88
 

Similar to Information warfare, assurance and security in the energy sectors (20)

CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITYCYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
 
Systemic cybersecurity risk
Systemic cybersecurity riskSystemic cybersecurity risk
Systemic cybersecurity risk
 
Cyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responsesCyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responses
 
Francesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityFrancesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber security
 
IT8073_Information Security_UNIT I _.pdf
IT8073_Information Security_UNIT I _.pdfIT8073_Information Security_UNIT I _.pdf
IT8073_Information Security_UNIT I _.pdf
 
IT8073 _Information Security _UNIT I Full notes
IT8073 _Information Security _UNIT I Full notesIT8073 _Information Security _UNIT I Full notes
IT8073 _Information Security _UNIT I Full notes
 
Cyber Security – Indian Perspective.pptx
Cyber Security – Indian Perspective.pptxCyber Security – Indian Perspective.pptx
Cyber Security – Indian Perspective.pptx
 
Honeypots in Cyberwar
Honeypots in CyberwarHoneypots in Cyberwar
Honeypots in Cyberwar
 
Understanding the Methods behind Cyber Terrorism
Understanding the Methods behind Cyber TerrorismUnderstanding the Methods behind Cyber Terrorism
Understanding the Methods behind Cyber Terrorism
 
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...National Critical Information Infrastructure Protection Centre (NCIIPC): Role...
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...
 
Peripheral Review and Analysis of Internet Network Security
Peripheral Review and Analysis of Internet Network SecurityPeripheral Review and Analysis of Internet Network Security
Peripheral Review and Analysis of Internet Network Security
 
114-116
114-116114-116
114-116
 
Battlefield Cyberspace: Exploitation of Hyperconnectivity and Internet of Things
Battlefield Cyberspace: Exploitation of Hyperconnectivity and Internet of ThingsBattlefield Cyberspace: Exploitation of Hyperconnectivity and Internet of Things
Battlefield Cyberspace: Exploitation of Hyperconnectivity and Internet of Things
 
AN EMPIRICAL STUDY ON CYBER SECURITY THREATS AND ATTACKS
AN EMPIRICAL STUDY ON CYBER SECURITY THREATS AND ATTACKSAN EMPIRICAL STUDY ON CYBER SECURITY THREATS AND ATTACKS
AN EMPIRICAL STUDY ON CYBER SECURITY THREATS AND ATTACKS
 
The Future of National and International Security on the Internet
The Future of National and International Security on the InternetThe Future of National and International Security on the Internet
The Future of National and International Security on the Internet
 
Cyber Security Intelligence
Cyber Security IntelligenceCyber Security Intelligence
Cyber Security Intelligence
 
Cybercrime and data sharing
Cybercrime and data sharingCybercrime and data sharing
Cybercrime and data sharing
 
A Review of Information Security Issues and Techniques.pdf
A Review of Information Security  Issues and Techniques.pdfA Review of Information Security  Issues and Techniques.pdf
A Review of Information Security Issues and Techniques.pdf
 
Forensics
ForensicsForensics
Forensics
 
Gebm os presentation final
Gebm os presentation finalGebm os presentation final
Gebm os presentation final
 

More from Love Steven

Job and Task Analysis
Job and Task AnalysisJob and Task Analysis
Job and Task AnalysisLove Steven
 
Malicious Software ,Good Internet Habits and ICT general Application usage
Malicious Software ,Good Internet Habits and ICT general Application usageMalicious Software ,Good Internet Habits and ICT general Application usage
Malicious Software ,Good Internet Habits and ICT general Application usageLove Steven
 
Cyber Security – Virus and the Internet
Cyber Security –  Virus and the Internet Cyber Security –  Virus and the Internet
Cyber Security – Virus and the Internet Love Steven
 
Personnel Management Software Developing and Processes
Personnel Management Software Developing and ProcessesPersonnel Management Software Developing and Processes
Personnel Management Software Developing and ProcessesLove Steven
 
Internet Explorer and Outlook Express
Internet  Explorer and Outlook ExpressInternet  Explorer and Outlook Express
Internet Explorer and Outlook ExpressLove Steven
 
Information and Communications Technology (ICT) General Application Software
 Information and Communications Technology (ICT)  General Application Software Information and Communications Technology (ICT)  General Application Software
Information and Communications Technology (ICT) General Application SoftwareLove Steven
 
Linux fundamentals Training
Linux fundamentals TrainingLinux fundamentals Training
Linux fundamentals TrainingLove Steven
 
Energy Databank in Nigeria: Management ,Technology and Security
Energy Databank in Nigeria:   Management ,Technology and SecurityEnergy Databank in Nigeria:   Management ,Technology and Security
Energy Databank in Nigeria: Management ,Technology and SecurityLove Steven
 

More from Love Steven (8)

Job and Task Analysis
Job and Task AnalysisJob and Task Analysis
Job and Task Analysis
 
Malicious Software ,Good Internet Habits and ICT general Application usage
Malicious Software ,Good Internet Habits and ICT general Application usageMalicious Software ,Good Internet Habits and ICT general Application usage
Malicious Software ,Good Internet Habits and ICT general Application usage
 
Cyber Security – Virus and the Internet
Cyber Security –  Virus and the Internet Cyber Security –  Virus and the Internet
Cyber Security – Virus and the Internet
 
Personnel Management Software Developing and Processes
Personnel Management Software Developing and ProcessesPersonnel Management Software Developing and Processes
Personnel Management Software Developing and Processes
 
Internet Explorer and Outlook Express
Internet  Explorer and Outlook ExpressInternet  Explorer and Outlook Express
Internet Explorer and Outlook Express
 
Information and Communications Technology (ICT) General Application Software
 Information and Communications Technology (ICT)  General Application Software Information and Communications Technology (ICT)  General Application Software
Information and Communications Technology (ICT) General Application Software
 
Linux fundamentals Training
Linux fundamentals TrainingLinux fundamentals Training
Linux fundamentals Training
 
Energy Databank in Nigeria: Management ,Technology and Security
Energy Databank in Nigeria:   Management ,Technology and SecurityEnergy Databank in Nigeria:   Management ,Technology and Security
Energy Databank in Nigeria: Management ,Technology and Security
 

Recently uploaded

UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1DianaGray10
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Thierry Lestable
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesThousandEyes
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsPaul Groth
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutesconfluent
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2DianaGray10
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaRTTS
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
 
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀DianaGray10
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Product School
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Product School
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
 
In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsExpeed Software
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxDavid Michel
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...Product School
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
 

Recently uploaded (20)

UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutes
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT Professionals
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 

Information warfare, assurance and security in the energy sectors

  • 1. INFORMATION WARFARE, ASSURANCE AND SECURITY: THE ENERGY SECTOR PERSPECTIVESAdedayo O.S CSO EIS Department Information Warfare, Assurance and Security 1 A paper delivered during the Energy Information System (EIS) departmental Seminar, March, 2013 at Computer Training room, ECN Abuja
  • 2. Information Warfare, Assurance and Security 2 1. Introduction 2. Definitions 3. Types of Information Warfare 4. Security Measures 5. Impact of Information Warfare 6. Vulnerability Scanners/Tools 7. Conclusion
  • 3. 1.0 Introduction Computers now control the electric power, telecommunication systems, aviation systems and the financial sector. Medical, business, criminal and other vita records are now stored on the computer systems (National Research Council, 1991). Information Technology has brought a lot changes to the way warfare are being wage today, a great number of the national infrastructures in the developed nation greatly depend on IT. The economic, social, political, educational, power and other activities depend on Information Technology . Information Warfare, Assurance and Security 3
  • 4. Electric Power Grid System Information Warfare, Assurance and Security 4 Internet
  • 5. 1.0 Introduction (cont’d) Internet is now a very powerful tool for trade, national and financial development, it is the largest computer network in the world comprising of smaller networks, forming the backbone for data transmission across the whole world because of the level of its great redundancy. (SecurityFocus, 2008). Information Warfare, Assurance and Security 5
  • 6. Information Warfare in Energy Sectors Examples  In June 2007, the Department of Homeland Security (DHS) leaked a video that showed how researchers launched a simulated attack that brought down a diesel electrical generator, leaving it coughing in a cloud of smoke, through a remote hack that was dubbed the Aurora vulnerability.  In January 2008, a CIA analyst revealed that a number of cyber attacks had cut power to several cities outside the U.S.  In May 2008, the Government Accountability Office (GAO) issued a scathing report on the number of security vulnerabilities at the Tennessee Valley Authority, the nation’s largest public power company.  In April 2009, The Wall Street Journal reported, according to unnamed current and former national security officials, that Russian and Chinese attackers penetrated the U.S. power grid, installing malware that could potentially be used to disrupt delivery.  In July 2009, NERC CSO Michael Assante told the House subcommittee on Emerging Threats, Cyber security, and Science and Technology, “Cyber threats to control systems are Information Warfare, Assurance and Security 6
  • 7. 1.0 Introduction (cont’d) Today, information war and cyber-war cover wide area of conflict types ranging from economic, social, political, and civilian to military scopes. Cyber warfare is generally referred to as the use of information technology devices to wedge war in a communication medium. Information Warfare, Assurance and Security 7
  • 8. 1.0 Introduction (cont’d) Cyber criminals now targets national infrastructures, such as public electricity system, transportation, energy, oil and gas system, finance and banking system, mass media, and military command and control (Wik, 2000). Information Warfare, Assurance and Security 8 The impact of the information warfare and its associated risk is very high based on the incident reports to Computer Emergency Response Team Coordination Center (CERT/CC) (CERT Statistics, 2009).
  • 9. 1.0 Introduction (cont’d) Computers now controls most of the civilian and military infrastructure, including communication, power systems, and over two million computers are being used by the military (Melnick, 2007). Libicki (1995) stated, information warfare is a military word which can be categorized into; Psychological warfare, intelligence-based warfare, Electronic warfare, cyber-warfare, hacker warfare, Command and control warfare, and economic information warfare Information Warfare, Assurance and Security 9
  • 10. 1.1 Characteristics of Cyber war Target exist in Cyberspace with real impact Telecommunication Computer Network Control Network Weapons Malicious Software Electromagnetic pulse (EMP) Weapons Data manipulation and destruction Techniques Virtual destruction of target in the cyberspace Disabling of system software Overwhelming of control system Information Warfare, Assurance and Security 10
  • 11. 1.1 Characteristics of Cyber war (cont’d) Capital required is small for large impact Physical risk associated is Low for the cyber criminal Role of media is moderate Legal factor are ill-defined Physical presence not required for successful attack (boundary less) Attack can have any effects focused or diffused Treat created are in the virtual and physical Information Warfare, Assurance and Security 11
  • 12. 2.0 Definitions of Information Warfare Haeni (1997) define IW as; “Actions taken to achieve information superiority by affecting adversary information, information-based processes, information systems, and computer-based networks while defending one's own information, information-based processes, information systems, and computer-based networks”. Other definition used include, “Cyberwar refers to conducting, and preparing to conduct, military operations according to information-related principles.” (Arquilla & Ronfeldt, 1997) The word Netwar was used by refers to information- related conflict at a grand level between nations or societies” (Arquilla & Ronfeldt, 1997) Information Warfare, Assurance and Security 12
  • 13. 2.1 Information Warfare Conflicts Information Warfare, Assurance and Security 13
  • 14. 2.2 Classification Of Information Warfare Information Warfare, Assurance and Security 14
  • 15. 3.0 Types of Information Warfare Offensive Information Warfare Defensive Information Warfare Passive Information Warfare Information Warfare, Assurance and Security 15
  • 16. 3.1 Offensive Information Warfare This is define as taking full control of the enemy’s information, computer and control systems using information weapons. Offensive Weapons include: computer virus, logic bombs, worms, Trojan horses, back doors, trap doors, chipping, electronic jamming, HERF guns, Nano machines, and microbes (Haeni, 1997). The tools can be in form of software code or hardware device with ability to perform dangerous operation, which can cause partial or total breakdown of the enemy’s computer system, infrastructure or networks. 16Information Warfare, Assurance and Security
  • 17. 3.2 Defensive Information Warfare The main security measures employed in defensive Information warfare are physical security, electronics countermeasure and encryption methods. Hence protecting system availability and data confidentiality are very important. (Kaomea, n.d). Countermeasures used in modern day Information warfare are intrusion detector systems, antivirus software, encryption, vulnerability scanners and security analysis software (Hrovat, 2001). 17Information Warfare, Assurance and Security
  • 18. 3.3 Passive Information Warfare Passive weapons are harmless, consisting of surveillance equipment used in information warfare, an example is during the building of the U.S. Embassy in Moscow in the 1980s, when the Soviet workers buried thousands of electronic diodes into the concrete slabs for the purpose of secret surveillance. This weaponry does not leave any trace or harmful effect on the victims. (Schwartau, 1996) 18Information Warfare, Assurance and Security
  • 19. 3.4 Information Weaponries A virus is a code fragment that copies itself into a larger program, modifying that program. A virus executes only when its host program begins to run. The virus then replicates itself, infecting other programs as it reproduces. (Russell & Gangemi, 2006) A worm is an independent program. It reproduces by copying itself in full-blown fashion from one computer to another, usually over a network. Unlike a virus, it usually doesn't modify other programs. (Russell & Gangemi, 2006) 19Information Warfare, Assurance and Security
  • 20. 3.4 Information Weaponries A Trojan horse is a code fragment that hides inside a program and performs a disguised function. It's a popular mechanism for disguising a virus or a worm (Russell & Gangemi, 2006) A bomb is a type of Trojan horse, used to release a virus, a worm or some other system attack. It's either an independent program or a piece of code that's been planted by a system developer or programmer. (Russell & Gangemi, 2006) Surveillance system, satellites systems, Signals and Human Intelligence(C4ISR and IW, n.d) 20Information Warfare, Assurance and Security
  • 21. 3.4 Information Weaponries (cont’d) A trap door, or a back door, is a mechanism that's built into a system by its designer. The function of a trap door is to give the designer a way to sneak back into the system, circumventing normal system protection. (Russell & Gangemi, 2006) Chipping is a process of implanting tiny electronics chip into hardware to perform an unexpected function by the manufacturer. The function include sending radio signal to a specific location, total breakdown and unexpected performance when remotely triggered by a specific frequency signal (Haeni, 1997). 21Information Warfare, Assurance and Security
  • 22. 3.4 Information Weaponries (cont’d) Nano machine and Microbes; this are special bred of micro organism and tiny robots with ability to destroy integrated circuits, computer system , buildings or completely shutdown systems Electronic jamming are used to destruct communication signals or overshadow signal with incorrect information to deceive the audience High Energy Radio Frequency( HERF) gun and Electro Magnetic Pulse (EMP) bomb are used to shutdown electronic devices or completely destroy it (Haeni, 1997). 22Information Warfare, Assurance and Security
  • 23. 4.0 Information Security Measures Protective measure used by civilian security practitioners are redundancy, alternative procedure and emergency plans (Wik, 2000). Implementing security policy and guidelines, proper allocation of all resources and training (Wik, 2000). Access control through the installation of intrusion detector , vulnerability scanners ,firewall systems and network security analyzer (Hrovat, 2001). Information confidentiality, integrity and availability measure through user authentication, encryption, and installation of antivirus and Internet security software. (Uchida, Sugano, & Andou, 2006). Information Warfare, Assurance and Security 23
  • 24. 4.1 Encryption Programs Currently, various types of encryption programs are being design and used to transmit information securely on the information superhighways by the civilians.  The rapid rate of development of encryption now support the use of strong, powerful encryption to protect private, public communications network and their data storage. There are now better products offering 128bit and 256 bit encryptions making the illegal and unauthorized decryption of transmitted information more difficult (Littleton, 1995). 24Information Warfare, Assurance and Security
  • 25. 4.2 Secure Digital Communication Modern technology in digital communication has brought a lot of improvement in information in terms encryption as a way of reducing security risk. The new communication utilized digital signatures, thereby preventing unauthorized interception, preserving the confidentiality and integrity of data (Littleton, 1995). Random encryption is used each time the phone is used making guessing the right key to decrypt the signal difficult (Littleton, 1995). 25Information Warfare, Assurance and Security
  • 26. 4.3 Redundant Management Systems In attempt to reduce security risk, the use of redundant management systems is employed as way of quick recovery from information security attacks (Littleton, 1995). Redundancy is defined as the ability of certain components of a system to assume functions of failed components without adversely affecting the performance of the system itself (Matalus & Fiering, 1977). Building of redundancy in communication path and backing up of all information systems resources is being used by cooperate organization to mitigate risk of system failure since it is rare to attack all the systems at a time. 26Information Warfare, Assurance and Security
  • 27. 5.0 Impact of Information Warfare on Energy Sector One the major responsibility is to “to win the information war” stated, in the National Military strategy of the United States of February 1995 (DeVries, 1997). Most Energy power systems and national economy depends greatly only the national information infrastructures due to its automated and network dependent nature. As a result, the national information infrastructures is the centre of all information warfare attack and it depends largely on electric power, computers and telecommunication (Wik, 2000). 27Information Warfare, Assurance and Security
  • 28. National Information Infrastructures Information Warfare, Assurance and Security 28 ELECTRIC POWER TELECOM COMPUTERS
  • 29. 5.1 Impact of Information Warfare on Private Sector The world today had moved from agrarian to industrial and finally to information wave. The most industrial nation’s economy greatly depends on information technology (Knapp & Boulton, 2006). Computers now control the electric power, telecommunication systems, aviation systems and the financial sector. Medical, business, criminal and other vital records are now stored on the computer systems (National Research Council, 1991). Information Warfare, Assurance and Security 29
  • 30. 5.1 Impact of Information Warfare on Private Sector cont’d Since 1994, when hackers attacks military, civilian and government organizations through the Griffiss Air Force base computers. The major target of cyber terrorist have being on the civilian firms, commercial firms and infrastructures. (Strassmann, 2001). Corporate espionage rate is rapidly increasing due to the current corporate competition, modern development in IT and miniaturization of digital devices and opening of internal network which make more information available for both the workers and vendors (Knapp & Boulton, 2006). Information Warfare, Assurance and Security 30
  • 31. 6.0 Vulnerability Scanners/Tools Some of the information weaponries used by the military and civilian security practitioners to acquire knowledge about their organizational strategies and plans and security measures to reduce information risks are :  Network Visualisation, Monitors and Sniffers softwares. Like Visio, NetViz, NetPartitioner, NeoTrace, TraceRoute, Ethload, Net Xray, Etherpeak, TCPDump, Snoop, IPWatcher, T-sight and Scott/Tkined  Vulnerability Analysis software. Like ISS Internet Scanner, Kane Security Analyst, Trident IP Toolbox / L3 Expert, Security Profile Inspector (SPI), SNI Ballista and SATAN  Intrusion detection software. Like RealSecure, NetRanger, Stalker/CyberCop, Intruder Alert, Network Flight Recorder, SHADOW and NIDS  Exploitation software. Like NTSecurity, RootShell, Offline NT Password Utility, Lopht Heavy Industries, AntiOnline, Insecure/Fyodor , TCPwrappers, Tripwire, COPS, crack, LophtCrack and ScanNT Information Warfare, Assurance and Security 31
  • 32. 7.0 Conclusion The increasing over dependency of our economy and infrastructures on IT system created a high level of security risks resulting from inexpensive cost of cyber attacks is of great concerns to both the public, private and military sectors. Information warfare is a two edged sword, a country capable of waging IW is also very vulnerability. Currently, security treat are more then the solution we have and the cost of preventing information warfare is far beyond the cost of the attack. It is therefore necessary for the government and agency in the energy sector to be more committed and defensive. Information Warfare, Assurance and Security 32
  • 33. References Adams, J. (2001). Virtual Defense. Retrieved from Foreign Affairs: http://www.foreignaffairs.com/articles/57037/james-adams/virtual-defense Arquilla, J. & Ronfeldt, D. (1997). Retrieved from http://www.rand.org/pubs/reprints/2007/RAND_RP223.pdf Brazzoli, S. M. (2007). Future prospects of information warfare and particularly psychological operations. . Retrieved from http://www.iss.org.za/uploads/SA2020CHAP13.PDF Bush, G. W. (2003). National Strategy to Secure Cyberspace. Retrieved from http://www.whitehouse. C4ISR and Information Warfare. Naval Weapons Systems. (n.d). Retrieved from http://www.owlnet.rice.edu/~nava201/presentations/Lecture19.ppt DeVries, A. (1997). Information Warfare and Its Impact on National Security (U). Retrieved from http://www.dtic.mil/cgi-bin/GetTRDoc? Location=U2&doc=GetTRDoc.pdf&AD=ADA325003 Haeni, R. E. (1997). Information Warfare an Introduction. Retrieved from http://www.trinity.edu/rjensen/infowar.pdf Hrovat, E. (2001). Information Warfare: The Unconventional Art In A Digital World. Retrieved from http://www.sans.org/reading_room/whitepapers/warfare/information-warfare-unconventional-art-digital-world_787 Kaomea, P. (n.d.). Beyond Security: A Data Quality Perspective on Defensive Information Warfare. Retrieved from http://mitiq.mit.edu/iciq/Documents/IQ%20Conference%201996/Keynote%20and%20Lunch%20Speeches/Beyond%20Security.pdf Kelsey, J. T. (2008). Hacking into International Humanitarian Law: The Principles of Distinction and Neutrality in the Age of Cyber Warfare. Retrieved from http://proxy1.ncu.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=bsh&AN=32010233&site=ehost- live Information Warfare, Assurance and Security 33
  • 34. Knapp, K. J., & Boulton, W. R. (2006). Cyber-warfare Threatens Corporations: Expansion into Commercial Environments. Information Systems Management. Retrieved from http://proxy1.ncu.edu/login?url=http://search.ebscohost.com/login.aspx? direct=true&db=bsh&AN=20025701&site=ehost-live Melnick, J. (2007). The cyberwar against the United States. Retrieved from http://www.boston.com/news/globe/editorial_opinion/oped/articles/2007/08/19/the_cyberwar_against_the_united_states/ Nunes, P. F. (2001). The Impact of New Technologies in the Military Arena: Information Warfare. Retrieved from http://www.iwar.org.uk/iwar/resources/technology/nunes.htm Peters, D. (2009). Intercontinental Replaces ATM Cards with Verve Chip. Retrieved from http://businessworldng.com/web/articles/79/1/Intercontinental-Replaces-ATM-Cards-with-Verve-Chip/Page1.html Research Council National. (1991). Computers at Risk. Washington D.C: National Academy Press. SecurityFocus. (2008). Retrieved from http://www.securityfocus.com/glossary/I Strassmann, P. A. (2001). Government Should Blaze Global Information Warfare Trails. . Retrieved from http://www.strassmann. com/pubs/searchsecurity/2001-8.php. Thom, M. (n.d). Information Warfare Capabilities and Policy Issues. Retrieved from http://www2.fiu.edu/~apodaca/Information %20Warfare%20Lecture.ppt Uchida, K. Sugano, N. & Andou, S. (2006). Information Security Solutions. Retrieved from http://www.fujitsu.com/downloads/MAG/vol43-2/paper04.pdf Wik, M. W. (2000). Revolution in Information Affairs: Tactical and Strategic Implications of Information Warfare and Information Operations. Retrieved from http://ics.leeds.ac.uk/papers/pmt/exhibits/812/wik.pdf Information Warfare, Assurance and Security 34
  • 35. THANK YOU Information Warfare, Assurance and Security 35

Editor's Notes

  1. This template can be used as a starter file for presenting training materials in a group setting. Sections Right-click on a slide to add sections. Sections can help to organize your slides or facilitate collaboration between multiple authors. Notes Use the Notes section for delivery notes or to provide additional details for the audience. View these notes in Presentation View during your presentation. Keep in mind the font size (important for accessibility, visibility, videotaping, and online production) Coordinated colors Pay particular attention to the graphs, charts, and text boxes. Consider that attendees will print in black and white or grayscale. Run a test print to make sure your colors work when printed in pure black and white and grayscale. Graphics, tables, and graphs Keep it simple: If possible, use consistent, non-distracting styles and colors. Label all graphs and tables.
  2. This is another option for an Overview slide.