Cyber defense



Download 2.54 Mb.
View original pdf
Page50/85
Date09.12.2022
Size2.54 Mb.
#60094
1   ...   46   47   48   49   50   51   52   53   ...   85
Cyber Defense Handbook
32
, blockchain
33
, big data
34
, 5G
35
) to cyber defense or the use of novel means such as RPAS
36
is also necessary to keep an operational level equivalent to other cyberspace forces in the same geostrategic environment.
401.
Research is a necessity to improve future cyber defense, but many of the results are not immediately applicable in the cyber force. With proper programming, the results could be applicable in the medium or long term. Therefore, it is very important to keep multiannual programs and to manage, control and evaluate the results in the medium and long term.
402.
The implementation of the research results is very diverse, and it may serve to create new tools or products, to improve existing technologies, to support new developments, to promote or improve existing developments or to rule out other less efficient research areas or which are not appropriate to cyber defense needs.
403.
The cyberspace force usually needs to carryout three types of development (self- development, external and cooperative) to maintain its operational level
404.
Self-development is conducted by the cyber force with its own human, material, cognitive


GUÍA DE
CIBERDEFENSA
ORIENTACIONES PARA EL DISEÑO, PLANEAMIENTO, IMPLANTACIÓN Y DESARROLLO DE UNA CIBERDEFENSA MILITAR
62
and financial resources. It may include acquiring commercial products to solve specific parts of the development package, but the management, design, integration of all parts, implementation, evaluation and validation is always carried out by the cyber force. Ina self- development project, only the cyber force has the complete knowledge of the development and its functionalities.
405.
Self-development maybe necessary, inter alia, due to shortage (there is no external support, financial incapacity (there is no external financial prospect, security (information on the product, its development process and functionality are highly classified, so confidentiality would be jeopardized by collaboration with third parties, time restrictions (public procurement and development processes maybe too slow to respond to urgent needs, profitability (it is a less expensive option) and suitability (the cyber force has the best skills).
406.
External development is carried out by an external entity, in accordance with the operational and, sometimes technical, requirements established by the cyber force through a contract.
407.
Cooperative development is carried out jointly by the cyberspace force and other entities through a cooperation agreement.
408.
Typically, the cyber force will need to carryout the three types of development self- development for sensitive or urgent needs external for the long-term; and cooperative for complex developments.

Download 2.54 Mb.

Share with your friends:
1   ...   46   47   48   49   50   51   52   53   ...   85




The database is protected by copyright ©ininet.org 2024
send message

    Main page