SlideShare une entreprise Scribd logo
1  sur  40
Defensive Information Warfare ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Goals of Defensive Information Warfare ,[object Object],[object Object],[object Object],[object Object]
Defensive Information Warfare ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Defensive Information Warfare ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Defensive Playbook ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Defensive Playbook ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Defensive Playbook ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Defensive Playbook ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Defensive Playbook ,[object Object],[object Object],[object Object],[object Object]
Defensive Playbook ,[object Object],[object Object],[object Object],[object Object],[object Object]
Defensive Playbook ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Too Defensive ? ,[object Object]
Information Security and  Information Assurance ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Perception Management ,[object Object],[object Object],[object Object],[object Object],[object Object]
CIA Model and Authorization  ,[object Object],[object Object],[object Object],[object Object],[object Object]
CIA Model and Authorization ,[object Object],[object Object],[object Object],[object Object],[object Object]
Authorization Organization ,[object Object],[object Object],[object Object],[object Object],[object Object]
The Notion of Privacy ,[object Object],[object Object],[object Object],[object Object]
Privacy and Secrets ,[object Object],[object Object],[object Object],[object Object],[object Object]
Privacy and Anonymity ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Privacy and Anonymity ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Authentication ,[object Object],[object Object]
Authentication ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Authentication ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Authentication ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Authentication ,[object Object],[object Object],[object Object],[object Object],[object Object]
Authentication ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Authentication ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Authentication ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Authentication ,[object Object],[object Object],[object Object]
Integrity ,[object Object],[object Object],[object Object]
Integrity ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Integrity ,[object Object],[object Object],[object Object],[object Object],[object Object]
Audit ,[object Object],[object Object],[object Object],[object Object],[object Object]
Audit ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Audit ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Audit ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Audit ,[object Object],[object Object],[object Object],[object Object]
Audit ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Proactive Solutions ,[object Object],[object Object],[object Object],[object Object],[object Object]

Contenu connexe

Tendances

Health information security 2 : Basic concepts
Health information security 2 : Basic conceptsHealth information security 2 : Basic concepts
Health information security 2 : Basic conceptsDr. Lasantha Ranwala
 
What-is-computer-security
What-is-computer-securityWhat-is-computer-security
What-is-computer-securityiamvishal2
 
Ethical Hacking by Krutarth Vasavada
Ethical Hacking by Krutarth VasavadaEthical Hacking by Krutarth Vasavada
Ethical Hacking by Krutarth VasavadaKrutarth Vasavada
 
Chapter 3 Ensuring Internet Security
Chapter 3 Ensuring Internet SecurityChapter 3 Ensuring Internet Security
Chapter 3 Ensuring Internet SecurityPatty Ramsey
 
Safer Technology Through Threat Awareness and Response
Safer Technology Through Threat Awareness and ResponseSafer Technology Through Threat Awareness and Response
Safer Technology Through Threat Awareness and ResponseStephen Cobb
 
Types of attacks and threads
Types of attacks and threadsTypes of attacks and threads
Types of attacks and threadssrivijaymanickam
 
Top 10 web server security flaws
Top 10 web server security flawsTop 10 web server security flaws
Top 10 web server security flawstobybear30
 
Viruses, Biometrics And Encryption
Viruses, Biometrics And EncryptionViruses, Biometrics And Encryption
Viruses, Biometrics And Encryptionsmithj12
 
Phishing Attacks
Phishing AttacksPhishing Attacks
Phishing AttacksJagan Mohan
 
Web Server Web Site Security
Web Server Web Site SecurityWeb Server Web Site Security
Web Server Web Site SecuritySteven Cahill
 
Introduction to Web Server Security
Introduction to Web Server SecurityIntroduction to Web Server Security
Introduction to Web Server SecurityJITENDRA KUMAR PATEL
 

Tendances (20)

Health information security 2 : Basic concepts
Health information security 2 : Basic conceptsHealth information security 2 : Basic concepts
Health information security 2 : Basic concepts
 
PPT on Phishing
PPT on PhishingPPT on Phishing
PPT on Phishing
 
What-is-computer-security
What-is-computer-securityWhat-is-computer-security
What-is-computer-security
 
Ethical Hacking by Krutarth Vasavada
Ethical Hacking by Krutarth VasavadaEthical Hacking by Krutarth Vasavada
Ethical Hacking by Krutarth Vasavada
 
Computer security
Computer securityComputer security
Computer security
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to security
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Chapter 3 Ensuring Internet Security
Chapter 3 Ensuring Internet SecurityChapter 3 Ensuring Internet Security
Chapter 3 Ensuring Internet Security
 
Health Information Privacy and Security
Health Information Privacy and SecurityHealth Information Privacy and Security
Health Information Privacy and Security
 
Web server security challenges
Web server security challengesWeb server security challenges
Web server security challenges
 
Safer Technology Through Threat Awareness and Response
Safer Technology Through Threat Awareness and ResponseSafer Technology Through Threat Awareness and Response
Safer Technology Through Threat Awareness and Response
 
Types of attacks and threads
Types of attacks and threadsTypes of attacks and threads
Types of attacks and threads
 
Top 10 web server security flaws
Top 10 web server security flawsTop 10 web server security flaws
Top 10 web server security flaws
 
Viruses, Biometrics And Encryption
Viruses, Biometrics And EncryptionViruses, Biometrics And Encryption
Viruses, Biometrics And Encryption
 
Phishing Presentation
Phishing Presentation Phishing Presentation
Phishing Presentation
 
Phishing Attacks
Phishing AttacksPhishing Attacks
Phishing Attacks
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to security
 
System Security
System SecuritySystem Security
System Security
 
Web Server Web Site Security
Web Server Web Site SecurityWeb Server Web Site Security
Web Server Web Site Security
 
Introduction to Web Server Security
Introduction to Web Server SecurityIntroduction to Web Server Security
Introduction to Web Server Security
 

En vedette

Article review - "Sometimes the dragon wins: A perspective on information-age...
Article review - "Sometimes the dragon wins: A perspective on information-age...Article review - "Sometimes the dragon wins: A perspective on information-age...
Article review - "Sometimes the dragon wins: A perspective on information-age...stuimrozsm
 
An analysis of steganographic techniques and terrorists can use them
An analysis of steganographic techniques and terrorists can use themAn analysis of steganographic techniques and terrorists can use them
An analysis of steganographic techniques and terrorists can use themstuimrozsm
 
StegIbiza: New Method for Information Hiding in Club Music
StegIbiza: New Method for Information Hiding in Club MusicStegIbiza: New Method for Information Hiding in Club Music
StegIbiza: New Method for Information Hiding in Club MusicKrzysztof Szczypiorski
 
Factors affecting advancement of diverse information technology workforce
Factors affecting advancement of diverse information technology workforceFactors affecting advancement of diverse information technology workforce
Factors affecting advancement of diverse information technology workforcestuimrozsm
 
Improving IT application services with six sigma
Improving IT application services with six sigmaImproving IT application services with six sigma
Improving IT application services with six sigmastuimrozsm
 
ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...
ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...
ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...Cyber Security Alliance
 
Strategising Social Media
Strategising Social MediaStrategising Social Media
Strategising Social MediaInfo Ops HQ
 
Information Warfare: Taking Control of The Black Male Image
Information Warfare: Taking Control of The Black Male ImageInformation Warfare: Taking Control of The Black Male Image
Information Warfare: Taking Control of The Black Male ImageJesse Muhammad
 
Indian Cyber Army
Indian Cyber ArmyIndian Cyber Army
Indian Cyber Armytushar garg
 
Diplomacy isn't #Diplomacy: Information Warfare Disguised
Diplomacy isn't #Diplomacy: Information Warfare DisguisedDiplomacy isn't #Diplomacy: Information Warfare Disguised
Diplomacy isn't #Diplomacy: Information Warfare DisguisedInfo Ops HQ
 
Cyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri LankaCyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri LankaEvan Pathiratne
 
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)Santosh Khadsare
 
Information Warfare
Information WarfareInformation Warfare
Information Warfaredibyendupaul
 
Brian Henger - Psychological Warfare: How Cyber Criminals Mess With Your Mind
Brian Henger - Psychological Warfare: How Cyber Criminals Mess With Your MindBrian Henger - Psychological Warfare: How Cyber Criminals Mess With Your Mind
Brian Henger - Psychological Warfare: How Cyber Criminals Mess With Your Mindcentralohioissa
 
The Information Warfare: how it can affect us
The Information Warfare: how it can affect usThe Information Warfare: how it can affect us
The Information Warfare: how it can affect usLuis Borges Gouveia
 
Study: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving CarsStudy: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving CarsLinkedIn
 

En vedette (19)

Article review - "Sometimes the dragon wins: A perspective on information-age...
Article review - "Sometimes the dragon wins: A perspective on information-age...Article review - "Sometimes the dragon wins: A perspective on information-age...
Article review - "Sometimes the dragon wins: A perspective on information-age...
 
An analysis of steganographic techniques and terrorists can use them
An analysis of steganographic techniques and terrorists can use themAn analysis of steganographic techniques and terrorists can use them
An analysis of steganographic techniques and terrorists can use them
 
StegIbiza: New Method for Information Hiding in Club Music
StegIbiza: New Method for Information Hiding in Club MusicStegIbiza: New Method for Information Hiding in Club Music
StegIbiza: New Method for Information Hiding in Club Music
 
Factors affecting advancement of diverse information technology workforce
Factors affecting advancement of diverse information technology workforceFactors affecting advancement of diverse information technology workforce
Factors affecting advancement of diverse information technology workforce
 
Improving IT application services with six sigma
Improving IT application services with six sigmaImproving IT application services with six sigma
Improving IT application services with six sigma
 
Psy war part ii
Psy war part iiPsy war part ii
Psy war part ii
 
ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...
ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...
ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...
 
Strategising Social Media
Strategising Social MediaStrategising Social Media
Strategising Social Media
 
Information Warfare: Taking Control of The Black Male Image
Information Warfare: Taking Control of The Black Male ImageInformation Warfare: Taking Control of The Black Male Image
Information Warfare: Taking Control of The Black Male Image
 
Fourth generation warfare
Fourth generation warfareFourth generation warfare
Fourth generation warfare
 
Indian Cyber Army
Indian Cyber ArmyIndian Cyber Army
Indian Cyber Army
 
Cybersecurity Presentation 6-11-15
Cybersecurity Presentation 6-11-15Cybersecurity Presentation 6-11-15
Cybersecurity Presentation 6-11-15
 
Diplomacy isn't #Diplomacy: Information Warfare Disguised
Diplomacy isn't #Diplomacy: Information Warfare DisguisedDiplomacy isn't #Diplomacy: Information Warfare Disguised
Diplomacy isn't #Diplomacy: Information Warfare Disguised
 
Cyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri LankaCyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri Lanka
 
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
 
Information Warfare
Information WarfareInformation Warfare
Information Warfare
 
Brian Henger - Psychological Warfare: How Cyber Criminals Mess With Your Mind
Brian Henger - Psychological Warfare: How Cyber Criminals Mess With Your MindBrian Henger - Psychological Warfare: How Cyber Criminals Mess With Your Mind
Brian Henger - Psychological Warfare: How Cyber Criminals Mess With Your Mind
 
The Information Warfare: how it can affect us
The Information Warfare: how it can affect usThe Information Warfare: how it can affect us
The Information Warfare: how it can affect us
 
Study: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving CarsStudy: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving Cars
 

Similaire à Defensive information warfare

Legal and Ethical Considerations in Nursing Informatics
Legal and Ethical Considerations in Nursing InformaticsLegal and Ethical Considerations in Nursing Informatics
Legal and Ethical Considerations in Nursing InformaticsKimarie Brown
 
Data+security+sp10
Data+security+sp10Data+security+sp10
Data+security+sp10ismaelhaider
 
Confidentiality Privacy and Security.ppt
Confidentiality Privacy and Security.pptConfidentiality Privacy and Security.ppt
Confidentiality Privacy and Security.pptJohnLagman3
 
Technical seminar on Security
Technical seminar on Security Technical seminar on Security
Technical seminar on Security STS
 
Chapter 6Authenticating PeopleChapter 6 OverviewThe th
Chapter 6Authenticating PeopleChapter 6 OverviewThe thChapter 6Authenticating PeopleChapter 6 OverviewThe th
Chapter 6Authenticating PeopleChapter 6 OverviewThe thsamirapdcosden
 
Awareness Training on Information Security
Awareness Training on Information SecurityAwareness Training on Information Security
Awareness Training on Information SecurityKen Holmes
 
Managing privacy by Victor Chapela
Managing privacy by Victor ChapelaManaging privacy by Victor Chapela
Managing privacy by Victor ChapelaJuan Carlos Carrillo
 
Security in E-commerce
Security in E-commerceSecurity in E-commerce
Security in E-commercem8817
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information securityjayashri kolekar
 
Security for e commerce
Security for e commerceSecurity for e commerce
Security for e commerceMohsin Ahmad
 
Rothke Sia 2006
Rothke   Sia 2006Rothke   Sia 2006
Rothke Sia 2006Ben Rothke
 
Lecture-3.ppt
Lecture-3.pptLecture-3.ppt
Lecture-3.pptKaty Kate
 
securityenvironment.pptx
securityenvironment.pptxsecurityenvironment.pptx
securityenvironment.pptxrehamrere
 
Asegurarme de la Seguridad?, Un Vistazo al Penetration Testing
Asegurarme de la Seguridad?, Un Vistazo al Penetration TestingAsegurarme de la Seguridad?, Un Vistazo al Penetration Testing
Asegurarme de la Seguridad?, Un Vistazo al Penetration TestingSoftware Guru
 
security and ethical challenges
security and ethical challengessecurity and ethical challenges
security and ethical challengesVineet Dubey
 

Similaire à Defensive information warfare (20)

Legal and Ethical Considerations in Nursing Informatics
Legal and Ethical Considerations in Nursing InformaticsLegal and Ethical Considerations in Nursing Informatics
Legal and Ethical Considerations in Nursing Informatics
 
Data+security+sp10
Data+security+sp10Data+security+sp10
Data+security+sp10
 
Confidentiality Privacy and Security.ppt
Confidentiality Privacy and Security.pptConfidentiality Privacy and Security.ppt
Confidentiality Privacy and Security.ppt
 
Technical seminar on Security
Technical seminar on Security Technical seminar on Security
Technical seminar on Security
 
Chapter 6Authenticating PeopleChapter 6 OverviewThe th
Chapter 6Authenticating PeopleChapter 6 OverviewThe thChapter 6Authenticating PeopleChapter 6 OverviewThe th
Chapter 6Authenticating PeopleChapter 6 OverviewThe th
 
Awareness Training on Information Security
Awareness Training on Information SecurityAwareness Training on Information Security
Awareness Training on Information Security
 
Managing privacy by Victor Chapela
Managing privacy by Victor ChapelaManaging privacy by Victor Chapela
Managing privacy by Victor Chapela
 
Security in E-commerce
Security in E-commerceSecurity in E-commerce
Security in E-commerce
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
Health Information Privacy and Security
Health Information Privacy and SecurityHealth Information Privacy and Security
Health Information Privacy and Security
 
Security for e commerce
Security for e commerceSecurity for e commerce
Security for e commerce
 
Rothke Sia 2006
Rothke   Sia 2006Rothke   Sia 2006
Rothke Sia 2006
 
Health Information Privacy and Security
Health Information Privacy and SecurityHealth Information Privacy and Security
Health Information Privacy and Security
 
Lecture-3.ppt
Lecture-3.pptLecture-3.ppt
Lecture-3.ppt
 
Overview
OverviewOverview
Overview
 
E comm jatin
E comm jatinE comm jatin
E comm jatin
 
securityenvironment.pptx
securityenvironment.pptxsecurityenvironment.pptx
securityenvironment.pptx
 
Asegurarme de la Seguridad?, Un Vistazo al Penetration Testing
Asegurarme de la Seguridad?, Un Vistazo al Penetration TestingAsegurarme de la Seguridad?, Un Vistazo al Penetration Testing
Asegurarme de la Seguridad?, Un Vistazo al Penetration Testing
 
Managing privacy
Managing privacyManaging privacy
Managing privacy
 
security and ethical challenges
security and ethical challengessecurity and ethical challenges
security and ethical challenges
 

Defensive information warfare

  • 1.
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.

Notes de l'éditeur

  1. DIW is ralated with intentional attacks Unintentional threaths such as