Cyber defense



Download 2.54 Mb.
View original pdf
Page15/85
Date09.12.2022
Size2.54 Mb.
#60094
1   ...   11   12   13   14   15   16   17   18   ...   85
Cyber Defense Handbook
Cyber tactics
092.
The military use of cyberspace is anew field that still has a lotto define and explore, but that does not mean that it is starting from scratch. The traditional forms of defense and use of force, in their essence, do not vary what is needed is to find the way to carry them outwith means and procedures especially adapted to cyberspace.
093.
Traditional military tactics from traditional domains such as reconnaissance, force concentration,
infiltration, surveillance, ambush, and fire and movement are also applicable in cyberspace.
094.
Reconnaissance is a requisite activity prior to planning and conducting a cyber operation with the main purpose of identifying the topology and vulnerabilities of the adversary cyberspace in all its layers.
095.
Force concentration in cyberspace can be done in two ways, quantitatively or qualitatively.
096.
Quantitative concentration of cyber forces refers to the concentration of numerous human resources (public resources, universities, population, most without a high technical or professional qualification, focused on the same target or task.
097.
An example of quantitative concentration is when a State uses a large number of people on staff (armed forces units, university students, etc, without necessarily a high-level professional qualification in the field of cyber defense, to pursue systematized instructions developed by a group of experts focused on concrete targets. It is a profitable strategy for high population States that can afford to spend the effort of many people on a single task
(e.g. many people trying to find an access point in a system until one of them succeeds).
098.
Another variant of quantitative concentration is when a State takes advantage of a hot or unstable social or political situation to convince and encourage a disgruntled population group to carryout malicious activities in cyberspace, concurrent in time and against the same target, following clear, simple and precise instructions, generally seeking denial of service effects.


GUÍA DE

Download 2.54 Mb.

Share with your friends:
1   ...   11   12   13   14   15   16   17   18   ...   85




The database is protected by copyright ©ininet.org 2024
send message

    Main page