Chapter 7 – |
Information Warfare |
Seymour Bosworth
Chapter Contents:
|
7.1 |
|
Introduction
|
|
7.2 |
|
Vulnerabilities
|
|
7.2.1 |
|
Critical Infrastructure
|
|
7.2.2 |
|
Off-the-Shelf Software
|
|
7.2.3 |
|
Dissenting Views
|
|
7.2.4 |
|
Rebuttal
|
|
7.3 |
|
Goals and Objectives
|
|
7.3.1 |
|
Infrastructure
|
|
7.3.2 |
|
Military
|
|
7.3.3 |
|
Government
|
|
7.3.4 |
|
Transportation
|
|
7.3.4.1 |
|
Aviation
|
|
7.3.4.2 |
|
Railroads
|
|
7.3.4.3 |
|
Trucking
|
|
7.3.4.4 |
|
Shipping
|
|
7.3.4.5 |
|
Other Transportation Vulnerabilities
|
|
7.3.5 |
|
Commerce
|
|
7.3.6 |
|
Financial Disruptions
|
|
7.3.6.1 |
|
Payment Systems
|
|
7.3.6.2 |
|
Investment Mechanisms
|
|
7.3.6.3 |
|
Banking
|
|
7.3.7 |
|
Medical Security
|
|
7.3.8 |
|
Law Enforcement
|
|
7.3.9 |
|
International and Corporate Espionage
|
|
7.3.10 |
|
Communications
|
|
7.3.11 |
|
Destabilization of Economic Infrastructure
|
|
7.4 |
|
Sources of Threats and Attacks
|
|
7.4.1 |
|
Nation-States
|
|
7.4.1.1 |
|
China and Information Warfare
|
|
7.4.1.2 |
|
Strategies
|
|
7.4.1.3 |
|
Training
|
|
7.4.2 |
|
Cyberterrorists
|
|
7.4.3 |
|
Corporations
|
|
7.4.4 |
|
Activists
|
|
7.4.5 |
|
Criminals
|
|
7.4.6 |
|
Hobbyists
|
|
7.5 |
|
Weapons of Cyberwar
|
|
7.5.1 |
|
Denial of Service and Distributed Denial of Service
|
|
7.5.2 |
|
Malicious Code
|
|
7.5.3 |
|
Cryptography
|
|
7.5.4 |
|
Psychological Operations
|
|
7.5.5 |
|
Physical Attacks
|
|
7.5.6 |
|
Biological and Chemical Weapons and Weapons of Mass Destruction
|
|
7.5.7 |
|
Weapons Inadvertently Provided
|
|
7.6 |
|
Defenses
|
|
7.6.1 |
|
Legal Defenses
|
|
7.6.2 |
|
Forceful Defenses
|
|
7.6.3 |
|
Technical Defenses
|
|
7.6.4 |
|
In-Kind Counterattacks
|
|
7.6.5 |
|
Cooperative Efforts
|
|
7.7 |
|
Summary
|
|
7.8 |
|
Further Reading
|
|
7.9 |
|
Notes
|
|
|
|