National Information Infrastructure
Loss of sanctuary Banking and finance Information and telecommunications Transportation Postal and shipping Emergency services Continuity of government Public health Food, Water, Energy Chemical industry Agriculture Tactical warfare Conventional warfare Information warfare
Information Security Model Existing security frameworks and standards do not adequately address organizational culture or human factors, or provide for the unexpected (as the model does through the concept of emergence). Adapted from the USC Marshall School of Business Institute for Critical Information Infrastructure Protection.
Attack on the weakest link Penetration phase Can begin from  the weakest link John the ripper  took 15 minutes to break Dali lama system Free download and tutorial available online Attack point
Equilibrum is at risk Dynamic interconnections fail

Informationwarfare

  • 1.
  • 2.
    Loss of sanctuaryBanking and finance Information and telecommunications Transportation Postal and shipping Emergency services Continuity of government Public health Food, Water, Energy Chemical industry Agriculture Tactical warfare Conventional warfare Information warfare
  • 3.
    Information Security ModelExisting security frameworks and standards do not adequately address organizational culture or human factors, or provide for the unexpected (as the model does through the concept of emergence). Adapted from the USC Marshall School of Business Institute for Critical Information Infrastructure Protection.
  • 4.
    Attack on theweakest link Penetration phase Can begin from the weakest link John the ripper took 15 minutes to break Dali lama system Free download and tutorial available online Attack point
  • 5.
    Equilibrum is atrisk Dynamic interconnections fail