GUÍA DE
CIBERDEFENSAORIENTACIONES PARA EL DISEÑO, PLANEAMIENTO, IMPLANTACIÓN Y DESARROLLO DE UNA CIBERDEFENSA MILITAR
29
to remain unnoticed as much as possible to exfiltrate information.
Cyber weapons like Flame
18have been especially designed for cyber espionage.
121.
It has been demonstrated that ciber weapons, the effects of which extend beyond cyberspace and which may affect equipment,
facilities and people, undeniably exist. Examples of such cyber weapons are Stuxnet
19, Duqu
20or Black Energy
21122.
A cyber force (para. 221) must have an appropriate arsenal (para. 409) that allows it to make legitimate use of force when allowed by law.
123.
A cyber weapon can actually have multiple purposes. It is the set of different cyber weapons together
with ad hoc procedures, command and control tools and specifically qualified personnel that enables the development of a cyber attack with a specific target.
124.
A cyber weapons system integrates different cyber weapons, command and control functions and all the technical support necessary to develop an offensive, defensive or exploitative cyber operation against a specific target.
125.
According
to the extent of the effects, the cyber weapons system can be strategic, operational, or tactical.
Cyber attack126.
A
cyber attack is the deliberate
use of a cyber weapon, by a person or automatically, to cause damage to a component of the opponent’s cyberspace, which may have indirect effects in the other domain of operations.
127.
The commander of an operation must consider all available capabilities to achieve the desired effects. Therefore, the Commander must consider traditional and cyber attacks and physical and cyber effects.
128.
There is no strict one-to-one correspondence between cyber attacks and cyber effects and between physical attacks and physical effects since a cyber attack can produce physical effects and a physical attack can produce effects in cyberspace.
129.
In a
joint operation, all possible combinations of attacks must be considered attacks originating in one domain and with a target in the same domain (Earth-Earth, Sea-Sea, Air-Air, Space-
Space, Cyberspace-Cyberspace) and attacks originating in one domain and with a target in another domain (Earth-Sea, Earth-Air, Earth-
Space, Earth-Cyberspace;
Sea-Earth, Sea-Air,
Sea-Space, Sea-Cyberspace; Air-Earth, Air-Sea,
Air-Space,
Air-Cyberspace; Space-Earth, Space-
Sea, Space-Air,
Space-Cyberspace; Cyberspace-
Earth,
Cyberspace-Sea,
Cyberspace-Air,
Cyberspace-Cyberspace).
Share with your friends: