CSE 468 - Information Conflict
|
Lecturer: Dr Carlo Kopp, PEng
- 122/75 Clayton Campus - Email: carlo@csse.monash.edu.au
Xt: 55229
|
|
CSE 468 Topic Objectives/Synopsis
|
|
Information conflict is concerned with how information is used in disputes, disagreements, conflicts, and survival contests and with how the information technology infrastructure influences such situations. Important recent developments in the area include the definition of a theoretical basis for the discipline using Shannon's information theory, game theory and graph theory.
This module is intended to provide an introduction to the basic theoretical concepts and an overview of various applications and their practical impact.
|
- Shannon's information theory concepts, basic game theory concepts.
- Four canonical strategies of information conflict vs Shannon's information theory.
- Compound information conflict strategies and using graphs to model these.
- Hypergames vs information conflict strategies.
- Evolutionary nature of information conflict and biological examples.
- Analysis and modelling of information conflict attacks and techniques.
- Forms of information conflict, Class I, II, III, IV information warfare, denial of service attack classification.
- Information conflict vs copyright, privacy, spam, espionage, surveillance, perception management, propaganda, advertising, hacking and cyberwar, viruses/worms, and identity theft.
- Information conflict vs basic concepts and risks in computer security and encryption.
- Problems arising in law enforcement and organisational security due to the proliferation of information conflict techniques.
|
Topic Prerequisites:
|
|
Basic familiarity with information technology is expected and assumed in the module materials. If you are uncertain about the level of your prior knowledge/experience in the area, please contact the lecturer at the beginning of the semester.There are no other units that depend upon this subject, and no formal prerequisites.
|
Lectures/Tutorials:
|
- Location/Time: 75/G55 (Seminar Room) @ Wed 15.00-17:00 hrs>
|
Topic Assessment: |
- 3 Points
- Assignments: (2 at 25% each) totalling 50%.
- One 50% final examination (3 hours).
A 45% hurdle will be applied to the assignments and the final examination. Assignment due dates will be provided when assignments are posted. Failing any hurdle could result in failing the topic.
Late submission without a good reason agreed in advance of submission due date will result in a penalty deduction of 3 marks per calendar day or part thereof. If you believe that your assignment will be delayed because of circumstances beyond your control such as illness you should apply for an extension before the due date. Medical certificates or certification supporting your application may be required.
Cheating/Plagiarism
It is an academic requirement of this subject that your solutions to the
assignment questions be your own work.
It is perfectly acceptable to seek help and advice when completing the assignments, but this must not be taken to the point where what is submitted as your own work is in part someone else's work which has not been clearly acknowledged in the report. Where you are using someone else's work as a part of your assignment, then such usage needs to be acknowledged in your report.
All submitted assignments will be checked by a plagiarism detection system (Damocles) which is 100% effective. Unacknowledged reproduction of work from others will result in zero marks being awarded.
|
Topic Schedule (Subject to Change): |
|
|
Lecture Number
|
Topic
|
1
|
Introduction
and overview - Lecture Notes |
2
|
Shannon's information theory concepts - Lecture Notes
|
3
|
Basic game theory concepts - Lecture Notes |
4
|
Four canonical strategies of information conflict vs
Shannon's information theory - Lecture Notes |
5
|
Compound information conflict strategies and using graphs to
model these - Lecture Notes |
6
|
Hypergames vs information conflict strategies - Lecture
Notes |
7
|
Evolutionary nature of information conflict and biological
examples - Lecture Notes and
IWC3 Slides |
8
|
Classical deception techniques, perception management, propaganda, advertising - Lecture Notes |
9
|
Forms of information conflict, Class I, II, III, IV information warfare, denial of service attack classification; Analysis and modelling of information conflict attacks and techniques - Lecture Notes |
10
|
Information conflict vs copyright, privacy, spam, espionage, surveillance,hacking and cyberwar, viruses/worms, and identity theft - Lecture Notes |
11
|
Information conflict vs basic concepts and risks in computer security and encryption - Lecture Notes |
12
|
Problems arising in law enforcement and organisational security due to the proliferation of information conflict techniques - Lecture Notes |
13
|
Revision - Lecture Notes |
Recommended Reading and Links |
- Dorothy E. Denning, Information Warfare and Security, ACMPress (Addison-Wesley), 1999, ISBN 0-201-43303-6.
- Winn Schwartau, Information Warfare: Cyberterrorism : Protecting Your Personal Security in the Electronic Age, New York, NY: Thunder's Mouth Press, 1995, Second Edition.
- In addition, selected research papers will be referenced and discussed throughout the topic.
|
Borden,
Andrew. What Is Information Warfare? Air & Space Power
Chronicles November 1999.
|
Kopp, Carlo; A Fundamental Paradigm of Infowar, Systems, February, 2000.
|
United States. Dept of the Air Force. Cornerstones of Information Warfare. Washington, 1995.
|
Cyberspace and Information Operations Study Center, Air University
|
Winn
Schwartau's Infowar.Com
|
Information Warfare
Monitor
|
The Information Warfare Site
|
Georgetown
University - COSC 511 Information Warfare: Terrorism, Crime, and
National Security
|
Prof Dorothy
Denning's Cybercrime, Infowar, and Infosecurity Webpage
|
Carlo Kopp's
Information/Electronic Warfare Publications
|
Aldrich, Richard
W. Cyberterrorism and Computer Crimes: Issues Surrounding the
Establishment of an International Regime. USAF Academy, CO, USAF
Institute for National Security Studies, 2000. 92 p. (INSS
occasional paper 32).
|
Arquilla,
John and Ronfeldt, David, eds. Networks and Netwars: The Future
of Terror, Crime, and Militancy. Santa Monica, CA, RAND Corp.,
2001. 375 p. (RAND report, MR-1382)
|
Information
Warfare Bibliography - Air University
|
A
Mathematical Theory of Communication by Claude E. Shannon
|
How
fundamental is information?
|
WHAT IS
INFORMATION?
|
Web Dictionary of
Cybernetics and Systems - Information
|
Measures of
Uncertainty: Shannon's Entropy
|
Properties of
Shannon's Entropy
|
Game Theory .net |
Harvard
University Introduction to Game Theory |
MIT
Game Theory Lectures |
Game Theory
Lectures |
AGSM -
Strategic Game Theory for Managers |
Introduction to
Game Theory - Indian Institute of Technology Delhi |
|
|
|
|
|
|