The Information Systems Security Officers Guide: Establishing and Managing an Information Protection Program

IW cuts across national borders, educational background, and cultural views. To ensure a consistent understanding during this discussion, working definitions of IW and many supporting terms will be offered. This does not preclude national interpretations and certainly does not attempt to rationalize, harmonize, and normalize definitions. Common terms of reference (TOR) permit a shared understanding, as well as a point of departure for applying the TOR within specific organizations.

There are as many definitions of IW and related topics as there are people. It's reminiscent of three blind men describing an elephant by touching the animal's various parts. One blind man said, "An elephant is a reptile and is thin and long" as he was touching the tail. Touching the tusks, another blind man said, "An elephant is like a big fish with its smooth and pointed body." The third blind man said, "An elephant resembles a large leaf with a hole in the middle" because he was touching the ears. None of them could extrapolate their interpretations to a real elephant. Similarly, what one sees is not necessarily what one gets. "Quesque c'est?" will be mispronounced if one does not have a basic understanding of French diction. So, too, is it with terms used to describe various practices in the information realm.

In some cases, more terminology only detracts. "Cyber" is too limiting. It's as if, rather than push through difficult points to achieve philosophical insights and technical understanding, people create terms to differentiate themselves without knowing what they are doing.

Information and knowledge are now in vogue. We are in the Information Age, and rapidly transitioning into the Knowledge Age. Acquiring the right data, deriving good information, and applying it to make sound decisions to positively affect the bottom line is essential. Search engines have made finding information on the Internet very simple. Witness during the past 15 years the explosion of terminology related to the protection of information and using information for national security purposes. The most important point is to understand the meaning of these terms and what the different functions can—and cannot—do in order to make an informed decision whether or not to commit resources (i.e., people, money, and time).

Many countries have developed definitions. IW, information assurance, information operations, information superiority, and other constructs popular in the U.S. military are part of the Revolution in Military Affairs (RMA) and Revolution in Security Affairs (RSA). Government organizations and businesses have developed additional terms, and some do not agree with the national version. So there can be a point of departure for this discussion, definitions accepted by many are put forth. In some cases, working definitions will be used. The following definitions are from the U.S. Department of Defense Dictionary of Military and Associated Terms [4]:

Let's expand on this because of the definition of IW. What is IW? It's more than computer network attack (CNA) and defense (CND). That much everyone agrees on. But what else is encompassed by it? Heated debates go on today about what IW should embrace and accomplish. IW is an umbrella concept embracing many disciplines. IW is most effective when performed in a synchronized and coherent fashion. That is why knowledge management (KM) complements it so well. All components of an organization, as well as across the enterprise, need to be included in an IW action plan.

The good news is IW embraces the marketing, public relations, counterintelligence, and other functions you now perform. IW is not these functions renamed. They continue to be run by the subject matter experts. IW is the coherent application and synchronized approach of these functions. What is needed are experts who, by analogy, are conductors of the orchestra. They know where the expertise resides within the organization, understand what the functions can and cannot do, and bring them to bear for optimum performance. At present only the military in a few countries comes close to understanding the relationships and functions of linking the physical domain with the virtual realm, and has begun policy development and allocation of resources. The equivalent does not exist in industry—yet.

The purpose of IW is to control or influence a decision-maker's actions. An area of control can be directly manipulated, whereas an area of influence can only be indirectly manipulated. Control and influence are the essence of power. From a business perspective, sector and industry leading market share and profit are the results of proper IW execution.

What would make a decision-maker act or not act? Perhaps false or misleading information, an analysis of open source information, documents mysteriously acquired, or intelligence from an employee hired away from the competition. IW at the corporate level manifests itself in marketing, public relations, legal, research and development, manufacturing, and other functions. With the introduction of commercial high-resolution satellite photography, some companies have altered their delivery and shipment schedules, including using empty rail cars and semi-tractor trailers to mask inventory, production capability, and customer quantities. IW is a full spectrum of capabilities. Ingredients are carefully selected and tailored to each case.

IW can be conducted without using physical destruction. Military psychological operations (PSYOPS) and commercial advertising both heavily depend on psychology and sociology, the study of individual and group behavior. The implications of this insight are enormous. Businesses engage in IW all the time, or is it that only the effective ones do?

IW enables direct and indirect attacks from anywhere around the world in a matter of seconds. Physical proximity to a target is not necessary. How is this possible? Because we have made conscious and unconscious decisions to have speed and connectivity without complementary security. In Sun Tzu's and Genghis Khan's eras, physical, personnel, and operational security were all that was needed for protection. Today we have fiber optics, satellites, personal digital assistants (PDAs), infrared and laser communications, interactive cable television, mobile phones, and a host of other technology marvels that allow us in a few seconds to reach anywhere. Now in seconds our information can be intercepted, modified, manipulated, and stolen.

No simple sentence or paragraph effectively describes IW. There are broad and narrow interpretations within national and international government, business, and academic communities, and some even totally reject the notion of IW. The overall view of IW must be expansive. Information is everywhere. We find information, for example, in mass media such as radio, television, and newspapers, at World Wide Web (WWW, or Web) sites, in communications systems, and in computer networks and systems. Any and all may be subjected to attack via Offensive IW (OIW). It follows that all these areas must be defended with Defensive IW (DIW):

Information operations (IO) as described below is included in IW: Actions taken to affect adversary information and information systems while defending one's own information and information systems. Also called IO.

In addition to the above definitions, U.S. National Security Telecommunications and Information Systems Security Committee (NSTISSC) 4009, National Information Systems Security (INFOSEC) Glossary [5] offers the following:

[4]Department of Defense Dictionary of Military and Associated Terms, April 12, 2001.

[5]National Security Telecommunications and Information Systems Security Committee Publication 4009, September 2000.

Категории