210.
Passive exploitative cyber operations are non- intrusive cyber operations, carried out on their own networks or public networks, aimed at obtaining information necessary for planning and conducting defensive and offensive cyber operations or other conventional operations.
211.
Active exploitative cyber operations are intrusive cyber operations, carried out on the networks of adversaries or third parties, aimed at obtaining information necessary for planning and conducting defensive and offensive cyber operations or other conventional operations.
212.
Response cyber operations are offensive cyber operations carried out on the networks of adversaries or third parties, in order to prevent, anticipate or react to cyber attacks on their own networks.
213.
Depending on the moment in which response
cyber operations are executed, in relation to the adversary’s intention, they can be preventive, preemptive or reactive.
214.
Preventive cyber operations are response cyber operations conducted against an adversary to avoid a cyber attack that, according to information obtained from their
own intelligence or allies, is planned and will occur in the near indeterminate future.
215.
Preemptive cyber operations are response cyber operations conducted against an adversary to avoid a cyber attack that, according to information obtained from their own intelligence or allies, will occur imminently.
216.
Reactive cyber operations are response cyber operations conducted against an adversary to repel an ongoing cyber attack.
217.
Some contemporary studies equate preventive
attacks with aggression, and therefore characterize them as illegitimate. Other studies consider that when an alleged adversary appears to begin confirmable preparations fora possible attack in the near future, the attack cay in fact be considered to have already begun.
218.
Offensive cyber operations are carried out in the framework of a declared conflict, on the networks of adversaries or third parties, with the purpose of causing a cyber-effect or a physical effect.
219.
False flag cyber operations are offensive cyber operations that are carried out covertly with the intention of blaming an innocent third party.
GUÍA DE
Share with your friends: