conference logo

Playlist "23C3: Who can you trust?"

Information Operations

Sebastian Schroeder

The use of information technology has brought a lot of new functionality and efficiency with it. But due to the fact that enterprises are totally dependant on IT, they are vulnerable to theft or destruction of information assets, a process described as information operations. This is the presentation of a one-year Postgraduate Infosec Research Project conducted in New Zealand.