|
Based on what you have read, consider the following questions and how you would reply to them:
As an ISSO, do you think you have a role to play in IW?
What do you think is the role of an ISSO in the "IT battlefield"?
Does your CIAPP or related documents consider IW attacks?
Do your plans consider what must be done to avoid collateral damage in the event of IW attacks against others?
Can your systems determine whether attacks against it were IW attacks?
Do you believe offensive IW is a good way to defend against IW attacks, for example, tracing the attacker back to his or her systems and unleashing malicious code against the attacker?
Do you believe that some of the IW philosophies should be incorporated into your CIAPP, such as OPSEC, information operations?
If not, why not?
|