Information and Cyber Warfare Flashcards

1
Q

4 Motivating Factors in Hacking

A
  1. Play: hacking/cracking, phreaking
  2. crime: illegal acts including intellectual property crime and computer fraud and abuse
  3. individual rights: conflicts over free speech and privacy
  4. national security: foreign intelligence operations, war and military conflicts, terrorism, and operations against a nation by nonstate players
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Information Warfare is about…

A
Money
Power 
Fear 
Politics
Survival
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

‘Actions taken to achieve information superiority by affecting an adversary information, information-based processes, information systems, and computer-based networks while defending one’s own information, information-based processes, information systems, and computer-based networks.’

A

Information Warfare

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

C2W

A

Command-and control-warfare is the military strategy that implements Information Warfare (DoD Directive TS- 3600.1, 21 December 1992, “Information Warfare”) on the battlefield and integrates physical destruction. Its objective is to decapitate the enemy’s command structure from its body of command forces.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

IBW

A

Intelligence-Based Warfare occurs when intelligence is fed directly into operations (notably, targeting and battle damage assessment), rather than used as an input for overall command and control. IBW results directly in the application of steel to target (rather than corrupted bytes).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

EW

A

Electronic Warfare - War in the realm of communications (radioelectronic and cryptographic). Attempts to degrade the physical basis for transferring information, while cryptographic warfare works between bits and bytes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Psychological Warfare

A

Encompasses the use of information against the human mind (rather than against computer support). There are four categories of psychological warfare: (i) operations against the national will, (ii) operations against opposing commanders, (iii) operations against troops, and – a category much respected abroad – (iv) cultural conflict.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

IO

A

Information Operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Information Blockade

A

The effectiveness of an information blockade presumes an era in which the well-being of societies will be as affected by information flows as they are today by flows of material supplies. Nations would strangle others’ access to external data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Information Imperialism

A

Trade is war. Nations struggle with one another to dominate strategic economic industries. Nations specialize in certain industries. The good industries command high wages and, usually, feature high growth rates. They tend to be knowledge- intensive. The constant exchange of information, in particular, early access to interesting technical questions and information resources, provides one an edge in coming up with interesting solutions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Information Terrorism

A

Information terrorism would target information about a specific individual to affect their actions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Semantic Attack

A

A system under semantic attack operates and will be perceived as operating correctly (otherwise the semantic attack is a failure), but it will generate answers at variance with reality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Simula-warfare

A

Could fighting a simulated war prove to the enemy that it will lose?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Gibson-warfare

A

Think conflict on the Internet, maybe at first only in the guise of virtual stalkers, sexual harassers, or flame wars. Now consider technologies’ capability to, in effect, launch a simulacrum into the net, armed with its master’s wants and needs, to make reservations, acquire goods, hand over assets, and, with work, to negotiate terms for enforceable contracts. Now take the next step and allow an individual’s online agents to conduct their own info battle. – TRON.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Michael Brow’s Three Types of IO

A

Type I: Perception Management
Type II: Denial, Destruction, degradation, distortion
Type III: Exploiting enemy information flows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Information operations that aim to affect the perceptions of others in order to influence their emotions, reasoning, decisions, and ultimately actions.

A

Perception Management

17
Q

Aim to influence behavior by affecting the human psyche through fear, desire, logic, and other mental factors.

A

PSYOPS

18
Q

SOFTWAR

A

“The hostile use of global television to shape another nation’s will by changing its vision of reality.”