EC4765 Cyber Warfare

Cyber warfare explored from an electrical engineering perspective. Historical examples of military cyber warfare operations are reviewed. Rudimentary denial-of-service techniques are initially discussed and progress to intelligent waveform-specific forms of computer network attack (CNA). The effect of communications signaling manipulation is analyzed in examples involving mobile wireless networks such as Global Systems Mobile (GSM), and the IEEE 802.11 and 802.16 standards. Extension of cyber warfare concepts to large scale systems is presented to include concepts in distributed denial of service attacks, distributed storage, distributed sensor coordination, and information exfiltration.

Prerequisite

EC3760

Lecture Hours

3

Lab Hours

2

Course Learning Outcomes

·       The student will be able to cite historical examples of cyber warfare, describe their underlying mechanics, and discuss their effectiveness.

·       Given a pre-defined communications system, the student will be able to determine efficient techniques for denying service to the system through analysis of the system's control mechanisms.

·       The student will be able to describe techniques for communications signaling and discuss the effects of inserting signaling variations into the system.

·       The student will be able to discuss large scale systems for cyber warfare and suggest methods for extending their capabilities.

·       The student will be able to describe the mechanics of classified large-scale sensors.

·       The student will be able to list operational techniques for information exfiltration.

·       The student will describe unique warfare capabilities of software-defined radios.