Cyber defense



Download 2.54 Mb.
View original pdf
Page27/85
Date09.12.2022
Size2.54 Mb.
#60094
1   ...   23   24   25   26   27   28   29   30   ...   85
Cyber Defense Handbook
CIBERDEFENSA
ORIENTACIONES PARA EL DISEÑO, PLANEAMIENTO, IMPLANTACIÓN Y DESARROLLO DE UNA CIBERDEFENSA MILITAR
39
Cyber operations
206.
Cyber operations are military actions planned, organized, coordinated and carried out by cyber defense units in order to achieve effects in cyberspace, as well as in other domains.
207.
There are six types of cyber operations, according to their nature, objective and environment in which they take place passive defensive, active defensive, passive exploitative, active exploitative, response, and offensive.
208.
Passive defensive cyber operations
run on their own networks and focus exclusively on prevention, protection, and resilience of their own cyberspace. No specific actions are taken against an adversary or a third party.
209.
Active defensive cyber operations
use intrusive or offensive techniques (ethical hacking, penetration testing, etc) on their own networks (authorized by networks authority) aimed at searching for vulnerabilities and risks and assessing the security level of their own cyberspace.
FIGURE 20.
CYBER DEFENSE AND
RELATED DISCIPLINES
FIGURE 21.
CYBER OPERATIONS


210.
Passive exploitative cyber operations are non- intrusive cyber operations, carried out on their own networks or public networks, aimed at obtaining information necessary for planning and conducting defensive and offensive cyber operations or other conventional operations.
211.
Active exploitative cyber operations are intrusive cyber operations, carried out on the networks of adversaries or third parties, aimed at obtaining information necessary for planning and conducting defensive and offensive cyber operations or other conventional operations.
212.
Response cyber operations are offensive cyber operations carried out on the networks of adversaries or third parties, in order to prevent, anticipate or react to cyber attacks on their own networks.
213.
Depending on the moment in which response cyber operations are executed, in relation to the adversary’s intention, they can be preventive, preemptive or reactive.
214.
Preventive cyber operations are response cyber operations conducted against an adversary to avoid a cyber attack that, according to information obtained from their own intelligence or allies, is planned and will occur in the near indeterminate future.
215.
Preemptive cyber operations are response cyber operations conducted against an adversary to avoid a cyber attack that, according to information obtained from their own intelligence or allies, will occur imminently.
216.
Reactive cyber operations are response cyber operations conducted against an adversary to repel an ongoing cyber attack.
217.
Some contemporary studies equate preventive attacks with aggression, and therefore characterize them as illegitimate. Other studies consider that when an alleged adversary appears to begin confirmable preparations fora possible attack in the near future, the attack cay in fact be considered to have already begun.
218.
Offensive cyber operations are carried out in the framework of a declared conflict, on the networks of adversaries or third parties, with the purpose of causing a cyber-effect or a physical effect.
219.
False flag cyber operations are offensive cyber operations that are carried out covertly with the intention of blaming an innocent third party.
GUÍA DE

Download 2.54 Mb.

Share with your friends:
1   ...   23   24   25   26   27   28   29   30   ...   85




The database is protected by copyright ©ininet.org 2024
send message

    Main page