Cyber defense


FIGURE 13. CYBER ATTACK TARGETS



Download 2.54 Mb.
View original pdf
Page18/85
Date09.12.2022
Size2.54 Mb.
#60094
1   ...   14   15   16   17   18   19   20   21   ...   85
Cyber Defense Handbook
FIGURE 13.
CYBER ATTACK TARGETS


GUÍA DE
CIBERDEFENSA
ORIENTACIONES PARA EL DISEÑO, PLANEAMIENTO, IMPLANTACIÓN Y DESARROLLO DE UNA CIBERDEFENSA MILITAR
29
to remain unnoticed as much as possible to exfiltrate information. Cyber weapons like
Flame
18
have been especially designed for cyber espionage.
121.
It has been demonstrated that ciber weapons, the effects of which extend beyond cyberspace and which may affect equipment, facilities and people, undeniably exist. Examples of such cyber weapons are Stuxnet
19
, Duqu
20
or Black Energy
21
122.
A cyber force (para. 221) must have an appropriate arsenal (para. 409) that allows it to make legitimate use of force when allowed by law.
123.
A cyber weapon can actually have multiple purposes. It is the set of different cyber weapons together with ad hoc procedures, command and control tools and specifically qualified personnel that enables the development of a cyber attack with a specific target.
124.
A cyber weapons system integrates different cyber weapons, command and control functions and all the technical support necessary to develop an offensive, defensive or exploitative cyber operation against a specific target.
125.
According to the extent of the effects, the cyber weapons system can be strategic, operational, or tactical.
Cyber attack
126.
A cyber attack is the deliberate use of a cyber weapon, by a person or automatically, to cause damage to a component of the opponent’s cyberspace, which may have indirect effects in the other domain of operations.
127.
The commander of an operation must consider all available capabilities to achieve the desired effects. Therefore, the Commander must consider traditional and cyber attacks and physical and cyber effects.
128.
There is no strict one-to-one correspondence between cyber attacks and cyber effects and between physical attacks and physical effects since a cyber attack can produce physical effects and a physical attack can produce effects in cyberspace.
129.
In a joint operation, all possible combinations of attacks must be considered attacks originating in one domain and with a target in the same domain (Earth-Earth, Sea-Sea, Air-Air, Space-
Space, Cyberspace-Cyberspace) and attacks originating in one domain and with a target in another domain (Earth-Sea, Earth-Air, Earth-
Space, Earth-Cyberspace; Sea-Earth, Sea-Air,
Sea-Space, Sea-Cyberspace; Air-Earth, Air-Sea,
Air-Space, Air-Cyberspace; Space-Earth, Space-
Sea, Space-Air, Space-Cyberspace; Cyberspace-
Earth,
Cyberspace-Sea,
Cyberspace-Air,
Cyberspace-Cyberspace).

Download 2.54 Mb.

Share with your friends:
1   ...   14   15   16   17   18   19   20   21   ...   85




The database is protected by copyright ©ininet.org 2024
send message

    Main page