Cyber defense



Download 2.54 Mb.
View original pdf
Page71/85
Date09.12.2022
Size2.54 Mb.
#60094
1   ...   67   68   69   70   71   72   73   74   ...   85
Cyber Defense Handbook
CIBERDEFENSA
ORIENTACIONES PARA EL DISEÑO, PLANEAMIENTO, IMPLANTACIÓN Y DESARROLLO DE UNA CIBERDEFENSA MILITAR
85 One of the measures that some countries implement to contain the spread of the virus is the use (usually on a voluntary basis) of mobile applications in order to identify, isolate, test and treat each case of infection know the traceability of the disease create epidemiological intensity maps and control mobility. These applications can be considered legally invasive because they require the use of specially protected data such as health, personal and geolocation data. In these cases, national cybersecurity must guarantee privacy rights and ensure the legitimate use of data, exclusively for purposes of epidemiological containment and protect them against unauthorized access.
Information
611.
Information is one of the main components of the cyber ecosystem, because cyberspace is an ideal environment for preparation, presentation, storage, processing, transport and destruction.
612.
In cyber defense, there are four relevant aspects to consider in relation to information its own information and knowledge management and actions against adversary’s information and knowledge management protection of confidentiality, integrity and availability of its own information and the action against confidentiality, integrity and availability of the adversary’s information protection against unauthorized exfiltration attempts of its own information and cyber operations against adversaries in order to exfiltrate information useful to the mission and influence and countering influence operations.
613.
Its own information and knowledge management is an essential command capability that the cyber force must promote and protect.
614.
An action against the adversary’s information and knowledge management produces strategic effects. For example, actions that affect the veracity of the cyber situational awareness or actions that affect the integrity of operational plans can create mistrust in the command and control system and consequently severely affect decision-making. This responsibility is typical of information operations units, but the cyber force can provide support due to its special preparedness to operate in cyberspace.
615.
Protecting the confidentiality, integrity and availability of information is a service of the cyber force, subordinated to the MoD information assurance branch.
616.
Actions against the protection of confidentiality and integrity of the adversary’s information are more typical of crypto services using cryptanalysis techniques, nevertheless the cyber force can support them, if necessary. Actions against availability are characteristic of the cyber force inoffensive actions such as DDoS cyber attacks.
617.
Protecting against unauthorized exfiltration of information is a responsibility of the cyber force, primarily through its cyber threat hunting capability.
618.
Cyber operations in order to exfiltrate information of adversaries is a responsibility of the cyber force that must be carried outwith extreme care and which will require the involvement of cyber exploitative and offensive capabilities.
619.
Influence operations are aimed at preparing, managing, modifying, denying, presenting, destroying or using public or adversary information, to promote perceptions, attitudes and behavior in certain audiences, favorable to its own operations and thus influence the decision-making, both human and automated. It is a responsibility more proper to the information operations (INFOP) and psychological operations (PSYOP) units.


GUÍA DE

Download 2.54 Mb.

Share with your friends:
1   ...   67   68   69   70   71   72   73   74   ...   85




The database is protected by copyright ©ininet.org 2024
send message

    Main page