INFOCON (short for information operations condition) is a threat level system in the United States similar to that of
FPCON. It is a defense system based primarily on the status of information systems and is a method used by the military to defend against a computer network attack.
Description
There are five levels of INFOCON, which recently changed to more closely correlate to
DEFCON
The defense readiness condition (DEFCON) is an alert state used by the United States Armed Forces. (DEFCON is not mentioned in the 2010 and newer document)
The DEFCON system was developed by the Joint Chiefs of Staff (JCS) and unified and spec ...
levels. They are:
*INFOCON 5 describes a situation where there is no apparent hostile activity against computer networks. Operational performance of all information systems is monitored, and password systems are used as a layer of protection.
*INFOCON 4 describes an increased risk of attack. Increased monitoring of all network activities is mandated, and all
Department of Defense Department of Defence or Department of Defense may refer to:
Current departments of defence
* Department of Defence (Australia)
* Department of National Defence (Canada)
* Department of Defence (Ireland)
* Department of National Defense (Philippin ...
end user
In product development, an end user (sometimes end-user) is a person who ultimately uses or is intended to ultimately use a product. The end user stands in contrast to users who support or maintain the product, such as sysops, system administrat ...
s must make sure their systems are secure.
Internet
The Internet (or internet) is the global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a ''internetworking, network of networks'' that consists ...
usage may be restricted to government sites only, and backing up files to
removable media
Expandable storage is a form of computer storage that is designed to be inserted and removed from a system. Some forms of removable media, such as optical discs, require a reader to be installed in the computer, while others, such as USB flash dri ...
is ideal.
*INFOCON 3 describes when a risk has been identified. Security review on important systems is a priority, and the
Computer Network Defense system's alertness is increased. All unclassified
dial-up
Dial-up Internet access is a form of Internet access that uses the facilities of the public switched telephone network (PSTN) to establish a connection to an Internet service provider (ISP) by dialing a telephone number on a conventional telepho ...
connections are disconnected.
*INFOCON 2 describes when an attack has taken place but the Computer Network Defense system is not at its highest alertness. Non-essential networks may be taken offline, and alternate methods of communication may be implemented.
*INFOCON 1 describes when attacks are taking place and the Computer Network Defense system is at maximum alertness. Any compromised systems are isolated from the rest of the network.
Similar concepts in private-sector computing
ThreatCon (Symantec)
Symantec's ThreatCon service no longer exists.
Broadcom
Broadcom Inc. is an American designer, developer, manufacturer and global supplier of a wide range of semiconductor and infrastructure software products. Broadcom's product offerings serve the data center, networking, software, broadband, wirel ...
has acquired Symantec.
In popular culture
In the TV Series, ''
Crisis
A crisis ( : crises; : critical) is either any event or period that will (or might) lead to an unstable and dangerous situation affecting an individual, group, or all of society. Crises are negative changes in the human or environmental affair ...
'' , the US government goes to INFOCON 2 when Francis Gibson has a massive cyber attack initiated upon the United States, nearly bringing it to war with China.
See also
*
Alert state
An alert state or state of alert is an indication of the state of readiness of the armed forces for military action or a state against natural disasters, terrorism
Terrorism, in its broadest sense, is the use of criminal violence to provo ...
*
Attack (computing)
A cyberattack is any offensive maneuver that targets computer information systems, computer networks, infrastructures, or personal computer devices. An attacker is a person or process that attempts to access data, functions, or other restricte ...
*
LERTCON
*
DEFCON
The defense readiness condition (DEFCON) is an alert state used by the United States Armed Forces. (DEFCON is not mentioned in the 2010 and newer document)
The DEFCON system was developed by the Joint Chiefs of Staff (JCS) and unified and spec ...
*
EMERGCON
*
FPCON (THREATCON)
*
Threat (computer)
In computer security, a threat is a potential negative action or event facilitated by a vulnerability that results in an unwanted impact to a computer system or application.
A threat can be either a negative "intentional" event (i.e. hacking: a ...
*
References
{{cite journal
, author = Strategic Command Directive (SD) 527-1
, title = Department of Defense (DOD) Information Operations Condition (INFOCON) System Procedures
, publisher = DISA Policy and Guidance , date = 2006-01-27
, url = http://info.publicintelligence.net/StrategicCommandDirective527-1_27JAN2006InformationOperationsCondition-INFOCON-System.pdf
, format = PDF , accessdate=2009-09-27
Alert measurement systems