Return to Information Warfare Tutorial Intro/Contents

The Threat

Module 2

The Lesson

Go back to intro. Go back to module 1. Go to module 3.



The module learning objectives:


You must consider the various perspectives of IW threats:

Perspective Concern
Corporate Security, reliability
FBI Criminal activity
Treasury\banking Security,non-reputability
DoD Defense
Intelligence Espionage - Input unavailable for beta version


What is DoD's concern?

After all, internal Continental United States (CONUS) policy is not it's concern...

Or is it?

There is a shared responsibility between managing DoD and commercial networks.


Why is DoD concerned?

DoD uses closed systems, router and firewall protection, and encryption in order to secure critical networks and message traffic; however, these secured transmissions ride on the public switched network, which has been proven to be vulnerable to IW attacks.

The enemy is turf blind. It does not worry about what is DoD or Public.


Information Warfare does not equal Computer Warfare.

Computer Warfare (CyberWar) is a subset of Information Warfare.

Many aspects of IW can be waged without the use of the computer. Take, for example, Somalia.


Threat Model

The following is a model that you can trace through for responding to IW threats.

Summary

Hopefully the case studies have illustrated that there are a variety of IW threats possible.

Here are the important points to this module:


Return to Information Warfare Tutorial Intro/Contents

Go back to intro. Go back to module 1. Go to module 3.