Cyber defense



Download 2.54 Mb.
View original pdf
Page5/85
Date09.12.2022
Size2.54 Mb.
#60094
1   2   3   4   5   6   7   8   9   ...   85
Cyber Defense Handbook
CIBERDEFENSA
ORIENTACIONES PARA EL DISEÑO, PLANEAMIENTO, IMPLANTACIÓN Y DESARROLLO DE UNA CIBERDEFENSA MILITAR
12
Advanced Persistent
Threat (APT)
Cyber
Cyber attack
Cyber control
Cyber defense
Cyber ecosystem
Cyber force
Cyber key terrain (CKT)
Cyber operation
Cyber operation
Cyber human
Cyber range
Cyber risk
Cyber security
Cyber situational
awareness (CSA)
Cyber threat
Cyber threat hunting
An organized group of experts, normally associated with a State, that uses sophisticated knowledge, tools and TTPs (tactics, techniques and procedures) to infiltrate, take control and persist in a third-party network, in order to have access to selected information and gain strategic advantages.
Related to cyberspace.
The deliberate use of a cyber weapon, by a person or automatically, to cause damage to a component of the opponent’s cyber space.
The degree of dominance in a cyberspace battle, of one cyber force over an opposing cyber force.
An organized and prepared capability to fight in cyberspace, which includes defensive, offensive and exploitative activities.
A system comprising all the components that are related to each other through cyberspace, as well as with cyberspace itself. A military unit specialized in cyberspace combat
2. The ability to carryout offensive actions in cyberspace. A set of cyber defense units of the armed forces grouped under one single command. In the broadest sense, it is the cyberspace-based military branch, service branch or armed service of a nation.
A set of components of cyberspace, in any of its layers (human, cyber-human, cognitive, logical, IT and geographic) that facilitate the activities, operations or functions essential to the mission and the destruction, interruption or impairment of which would generate a significant operational advantage for the adversary.
A set of military actions that are planned, organized, coordinated and carried out by cyber defense units in order to achieve effects in cyberspace, as well as in the other domain of operations.
A set of military actions that are planned, organized, coordinated and carried out by cyber defense units in order to achieve effects in cyberspace, as well as in the other domain of operations.
The identity of a cyberspace user in online communities or activities.
A restricted cyberspace area used to train cyber defense units and practice real cyber operations in a safe and isolated environment.
The probability that a cyber threat exploits a vulnerability to cause damage to an organization’s asset.
An organized set of measures aimed at preventing, avoiding and minimizing potential damages to their own networks and information systems.
A representation of the components and events of a cyber ecosystem, at a specific time, place and mission, the explanation of their meaning and the projection of their future state.
A potential source of damage to any organization’s asset that materializes through cyberspace.
A dynamic and proactive cyber defense process aimed at the detection and isolation of advanced threats that evade the traditional security solutions based on SIEM and perimeter cybersecurity devices (firewalls, IDS, IPS, sandboxing, etc.).



Download 2.54 Mb.

Share with your friends:
1   2   3   4   5   6   7   8   9   ...   85




The database is protected by copyright ©ininet.org 2024
send message

    Main page