Elements of Information Security - Confidentiality
Integrity
Availability
Authenticity
Non-repudiation
Classifications of Attacks - Active
Passive
Close-in
Insider
Distribution
Types of Information Warfare - (Active and Passive:)
Command and Control (C2)
Intelligence-based
Electronic
Psychological
Hacker
Economic
Cyber
Command and Control (C2) Warfare - Type of Information Warfare
The impact an attacker has over a compromised system or network that they control
Intelligence-based Warfare - Type of Information Warfare
,Sensor-based technology that directly corrupts technological systems
Consists of the design, protection, and denial of systems that seek sufficient knowledge to dominate the
battlespace
Electronic Warfare - Type of Information Warfare
Uses radio-electronic and cryptographic techniques to degrade communication
Radio electronic techniques attack the physical means of tending information whereas cryptographic
techniques use bits and bytes to disrupt the means of sending information
Psychological Warfare - Type of Information Warfare
The use of various techniques such as propaganda and terror to demoralize one's adversary in an
attempt to succeed in battle
Hacker Warfare - Type of Information Warfare
Purpose can vary from the shutdown of systems to data errors, theft of information, theft of services
system monitoring, false messaging, and access to data
Hackers generally use viruses, logic bombs, Trojan horses, and sniffers to perform these attacks
Economic Warfare - Type of Information Warfware
Affecting the economy of a business or nation by blocking the flow of information
Especially devastating to tech-heavy companies and organizations
, Cyberwarfare - Type of Information Warfare
The use of information systems against the virtual personas of individuals or groups
Includes information terrorism, semantic attacks (similar to hacker warfare, but instead of harming a
system, it takes over a system while maintaining the perception it is operating correctly), and simula-war
(simulated war, for example, acquiring weapons for only demonstration rather than actual use)
Cyber Kill Chain Methodology - Framework by Lockheed Martin
Phases:
Reconnaissance
Weaponization
Delivery
Exploitation
Installation
Command and Control (C2)
Actions on Objectives
TTPs - Tactics
Techniques
Procedures
Adversarial Behavior Identification - Behaviors that help with adversary identification:
Internal Reconnaissance
Use of PowerShell
Unspecified proxy activities
Use of CLI
HTTP user agent
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller oneclass. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $13.48. You're not tied to anything after your purchase.