CHAPTER 14

INFORMATION WARFARE

Seymour Bosworth

14.1 INTRODUCTION

14.2 VULNERABILITIES

14.2.1 Critical Infrastructure

14.2.2 Off-the-Shelf Software

14.2.3 Dissenting Views

14.2.4 Rebuttal

14.3 GOALS AND OBJECTIVES

14.3.1 Infrastructure

14.3.2 Military

14.3.3 Government

14.3.4 Transportation

14.3.5 Commerce

14.3.6 Financial Disruptions

14.3.7 Medical Security

14.3.8 Law Enforcement

14.3.9 International and Corporate Espionage

14.3.10 Communications

14.3.11 Destabilization of Economic Infrastructure

14.4 SOURCES OF THREATS AND ATTACKS

14.4.1 Nation-States

14.4.2 Cyberterrorists

14.4.3 Corporations

14.4.4 Activists

14.4.5 Criminals

14.4.6 Hobbyists

14.5 WEAPONS OF CYBERWAR

14.5.1 Denial of Service and Distributed Denial of Service

14.5.2 Malicious Code

14.5.3 Cryptography

14.5.4 Psychological Operations

14.5.5 Physical Attacks

14.5.6 Biological and Chemical Weapons and Weapons of Mass Destruction

14.5.7 Weapons Inadvertently Provided

14.6 DEFENSES

14.6.1 Legal Defenses

14.6.2 Forceful Defenses

14.6.3 Technical Defenses

14.6.4 In-Kind Counterattacks

14.6.5 Cooperative Efforts

14.6.6 Summary

14.7 FURTHER READING

14.8 NOTES

Information warfare is the offensive and defensive use of information and information systems to deny, exploit, corrupt, or destroy, an adversary's information, information-based processes, information systems, and computer-based networks while protecting one's own. Such actions are designed to achieve advantages over military or business adversaries.

—Dr. Ivan ...

Get Computer Security Handbook, Fifth Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.