GUÍA DE
CIBERDEFENSAORIENTACIONES PARA EL DISEÑO, PLANEAMIENTO, IMPLANTACIÓN Y DESARROLLO DE UNA CIBERDEFENSA MILITAR
25 In
the context of cyber defense, the risk to consider, above all, is the risk to the mission due to cyber threats.
In other words, how a successful cyber threat materialization can jeopardize the mission.
082.
It is necessary to minimize the risks of the cyberspace components when their operation is essential for mission accomplishment. These are the components of the cyber key terrain list.
083.
Cyber risk is managed through a seven-phase systematic process. Identify and prioritize the CKT components according to their potential impact on the mission in case their operation is impaired. Identify and evaluate the vulnerabilities of the
CKT components. Identify the potential cyber threats that can jeopardize the mission and assess their capability. Identify the assets of highest interest to the threat, either because they are valuable or useful to the threat or because they are those with the highest
impact on the organization, which is the threat’s goal. Identify the risks by carrying out a methodological analysis using a specialized tool and methodology (MAGERIT
Share with your friends: