The Information Warfare Site is an online resource that aims to stimulate debate on a variety of issues involving information security, information operations, computer network operations, homeland security and more.
The term information warfare or InfoWar refers to the use of information and communication technologies (ICT) for competitive advantages over an opponent.
Examples of information warfare weapons include viruses, worms, Trojan horses, logic bombs, trap doors, nanomachines and microbes, electronic jamming, and penetration exploits and tools.
Also Read: Information Security Overview
Martin libicki has divided Information warfare into the following categories:
Command and control warfare (C2 warfare): In the computer security industry, C2 warfare refers to the Impact an attacker possesses over a compromised system or network that they control.
Also Read: The Security Triangle (Security Model)
Intelligence-based warfare: Intelligence-based warfare is a sensor-based technology that directly corrupts technological systems. According to Libicki, “intelligence-based warfare” is warfare that consists of the design, protection, and denial of systems that seek sufficient knowledge to dominate the battlespace.
Electronic warfare: According to Libicki, electronic warfare uses radio-electronic and cryptographic techniques to degrade the communication.
Radio electronic techniques attack the physical means of sending information, whereas cryptographic techniques use bits and bytes to disrupt the means of sending information.
Also Read: Security Threats and Attack Vectors
Psychological warfare: Psychological warfare is the use of various techniques such as propaganda and terror to demoralize one’s adversary in an attempt to succeed in the battle.
Hacker warfare: According to Libicki, the purpose of this type of warfare can vary from shutdown of systems, data errors, theft of information, theft of services, system monitoring, false messaging, and access to data.
Hackers generally use viruses, logic bombs, Trojan horses, and sniffers to perform these attacks.
Also Read: What Is Honeypot ? Trap For Hackers !!
Economic warfare: According to Libicki, economic Information warfare can affect the economy of a business or nation by blocking the flow of information. This could be especially devastating to organizations that do a lot of business in the digital world.
Most important one
Cyber warfare: Libicki defines cyber warfare as the use of information systems against the virtual personas of individuals or groups.
It is the broadest of all information warfare and includes information terrorism, semantic attacks (similar to Hacker warfare, but Instead of harming a system.
It takes the system over and the system will be perceived as operating correctly), and simula-warfare(simulated war, for example, acquiring weapons for mere demonstration rather than actual use).
Each form of information warfare, mentioned above, consists of both defensive and offensive strategies.
Defensive Information Warfare: Involves all strategies and actions to defend against attacks on ICT assets.
Offensive information Warfare: Involves attacks against ICT assets of an opponent.
Above are the categories of information warfare according to Martin Libicki. If you need more information about it I mention one website in the article you can check there.