Cyber defense



Download 2.54 Mb.
View original pdf
Page31/85
Date09.12.2022
Size2.54 Mb.
#60094
1   ...   27   28   29   30   31   32   33   34   ...   85
Cyber Defense Handbook
Organization
239.
The traditional way of organizing military capabilities to fight in a traditional domain of operations is through a higher unit (military branch or service branch) that brings together all the specific capabilities of each domain, that is, the army, the navy and the air force. They are divided into three main components the general staff, in charge of advising and supporting the commander and planning operations the force, in charge of conducting the operations and force support, in charge of providing all the operational, logistical and technical support necessary to carryout the operations.
240.
When a cyber defense unit is created, the lack of consolidated cyberspace domain doctrine and the small size of the unit (anew unit usually begins small) has fostered the trend to fashion it within the organization of another already established domain. In the long term, this produces confusion and misunderstanding, because cyber defense units are then considered to perform just another function (cyber defense) in the land, sea and air domains, comparable to any other of the traditional functions (command and control, intelligence, maneuver, fire, information, civil-military cooperation, protection and logistical support) and disregard its true nature as the force responsible for military actions in a different domain of operations cyberspace. Therefore, it is advisable, regardless of the size of the unit, to centralize all cyber defense units in a higher unit as a service branch articulated in its three main components (general staff, force and force support) which will facilitate the natural evolution of the cyber force.
241.
The level of technical knowledge
required of the cyber force personnel is high, but this is not exclusive to the cyberspace domain it is also required in other domains. However, the military staff (tip of the iceberg) should be oriented predominantly to the command, organization, management and coordination responsibilities that fundamentally require
operational
knowledge and leave the technical responsibilities to associated bodies (part of the iceberg that is underwater) such as public and private consultancy services, cybersecurity and IT professional services and academia.
242.
These associated bodies should feel they are part of the cyber force as well, and for this reason, organizational structures, collaboration agreements and contracts that facilitate this loyalty must be defined.
GUÍA DE

Download 2.54 Mb.

Share with your friends:
1   ...   27   28   29   30   31   32   33   34   ...   85




The database is protected by copyright ©ininet.org 2024
send message

    Main page