Cyber defense



Download 2.54 Mb.
View original pdf
Page12/85
Date09.12.2022
Size2.54 Mb.
#60094
1   ...   8   9   10   11   12   13   14   15   ...   85
Cyber Defense Handbook
CIBERDEFENSA
ORIENTACIONES PARA EL DISEÑO, PLANEAMIENTO, IMPLANTACIÓN Y DESARROLLO DE UNA CIBERDEFENSA MILITAR
22
FIGURE 7.
CROSS-DOMAIN CYBERSPACE


GUÍA DE
CIBERDEFENSA
ORIENTACIONES PARA EL DISEÑO, PLANEAMIENTO, IMPLANTACIÓN Y DESARROLLO DE UNA CIBERDEFENSA MILITAR
23
Cyber Key Terrain
063.
The Cyber Key Terrain (CKT) is the set of cyber ecosystem components, in any of its layers human, cyber-human, cognitive, logical, IT and geographic) that facilitates the activities, operations or functions that are essential to the mission and the destruction, interruption or impairment of which would award a significant operational advantage for the adversary.
064.
In any cyber operation, as well as in any joint operation, it is necessary to identify the CKT components, study and assess their vulnerabilities, probability of being attacked and impact on the mission if sustaining an attack.
065.
In most cases, trying to protect all the CKT components is not feasible, therefore the CKT list must be prioritized and updated on a regular basis, to subsequently carryout a protection plan according to prioritization.
066.
The CKT component identification and protection process should be done in the same way that key terrain identification and protection is done inland, sea and air domains.
067.
The cyberspace layer model facilitates the CKT component identification process.
068.
The CKT components in the human layer are the people whose knowledge is considered essential for the operation and protection of all the components on the CKT list.
069.
The CKT components in the cognitive layer are the data, information or knowledge, which, if disclosed to the adversary, would seriously jeopardize the mission or if manipulated by the adversary, would create mistrust in the information systems essential to the mission.
070.
The CKT components in the logical layer are the information systems (including command and control, weapons, and navigation systems) that, if controlled or interfered with by the adversary, would seriously jeopardize the mission.
071.
The CKT components in the ICT layer are the IT networks components that, if controlled or interfered with by the adversary, could lead to denials of service or degraded performance of mission critical services.
072.
The CKT components in the geographic layer are the sites where critical IT components are located (data processing centers, network control centers, IT security operations centers, internet exchange points, critical internet service providers, submarine cable infrastructure, etc) and, if physical destroyed, could jeopardize mission accomplishment.
073.
The protection of national submarine cable infrastructures and their land connection points points of presence and landing stations) must be considered a strategic priority in the national cybersecurity framework, since they are the main global communications platform. In particular, it is estimated that more than 95% of all transoceanic digital communications are carried out on the submarine cable infrastructure, since it is faster and cheaper than satellite infrastructure.
074.
Submarine cable sabotage is a complex operation, but it is now considered a standard operating procedure for intelligence services of some States, as well as suspicious naval maneuvers carried out near strategic submarine cable routes and land connection points albeit raising concern among potentially affected countries.


GUÍA DE

Download 2.54 Mb.

Share with your friends:
1   ...   8   9   10   11   12   13   14   15   ...   85




The database is protected by copyright ©ininet.org 2024
send message

    Main page