Cyber defense



Download 2.54 Mb.
View original pdf
Page11/85
Date09.12.2022
Size2.54 Mb.
#60094
1   ...   7   8   9   10   11   12   13   14   ...   85
Cyber Defense Handbook
Domain of operations
048.
A domain of operations is the sphere of interest and influence in which activities, functions, and operations are undertaken to accomplish missions and exercise control over an opponent in order to achieve desired effects.
1
049.
For a given domain to be qualified as a domain of operations, it must meet six criteria. Requires unique capabilities to operate in that domain. Is not fully encompassed by any other single domain. Is characterized by a shared presence of friendly and opposing capabilities. Is able to exert control over an opponent trough influence and dominance. Provides opportunities for synergy with other domains. Provides asymmetric opportunities across domains.
050.
Cyberspace undoubtedly meets all six criteria and is therefore qualified as a domain of operations.
051.
Cyberspace, as a domain of operations, is an environment where specific military operations
(cyber operations, para. 206) are conducted. These cyberoperations can produce direct cyber effects (para. 145) and indirect physical effects in traditional domains.
052.
In order to produce the desired effects, the cyber force (para. 221) must have freedom of action and be able to exercise control over the opponent (cyber superiority, para. The ultimate purpose of cyber operations is for the cyber effects to support mission accomplishment. Therefore, cyber defense capabilities and their potential effects must be considered throughout the entire life cycle of joint operations planning and conducting.
FIGURE 6.
CYBERSPACE DOMAIN OF OPERATIONS


Nature of cyberspace
054.
Cyberspace has some singularities (artificiality, imperceptibility, dynamism, ubiquity,
immediacy, transversality) that distinguish it from the other domains and therefore requires special capabilities to operate in it.
055.
Cyberspace is an artificial, man-made environment, and, as such, modifiable thereby. In fact, cyberspace is acquiring anew dimension as new technologies and services emerge. The original Internet of the web and email have little to do with the current web involving social media, cloud and the Internet of Things. Cyberspace is physically imperceptible, invisible and intangible, which makes it even more difficult to understand and interpret than traditional domains. This difficulty makes it yet more challenging when defining and developing military capabilities and procedures to operate in it.
057.
Cyberspace is a dynamic and changing environment that requires permanent monitoring, continuous cyber situational awareness updating and flexible planning.
058.
Cyberspace is ubiquitous and immediate. An action in one place can have almost immediate effects anywhere else in the world. Unlike the other domains, inmost cases, it is unnecessary to deploy cyber defense forces in the geographical environments where the effects are to be produced.
059.
Cyberspace has borders, that is, it has a perimeter that separates an internal area from an external area and which allows an owner or authority to control the movements between them.
060.
Effective border protection in cyberspace scales poorly, compared to other domains. Certainly, effective access control in cyberspace can be established when selecting entities authorized to access a given area of cyberspace, but as this area broadens, access control weakens.
061.
States have effective mechanisms to carryout selective access control of their national sovereign land, sea and air spaces. Nevertheless, carrying out a similarly effective control in the national sovereign cyberspace is currently unfeasible, despite attempts by some countries to create their own sovereign internet.
062.
Cyberspace is cross-domain. In reality, it behaves like a supra-space with imposing presence and influence over the other domains. This transversality means that cyberspace must be especially taken into consideration in all joint aspects (doctrine, operations planning and development, organization, etc.)
GUÍA DE

Download 2.54 Mb.

Share with your friends:
1   ...   7   8   9   10   11   12   13   14   ...   85




The database is protected by copyright ©ininet.org 2024
send message

    Main page