Cyber defense



Download 2.54 Mb.
View original pdf
Page61/85
Date09.12.2022
Size2.54 Mb.
#60094
1   ...   57   58   59   60   61   62   63   64   ...   85
Cyber Defense Handbook
CIBERDEFENSA
ORIENTACIONES PARA EL DISEÑO, PLANEAMIENTO, IMPLANTACIÓN Y DESARROLLO DE UNA CIBERDEFENSA MILITAR
73 497.

The offensive consists of seizing, retaining and exploiting the initiative and taking advantage of the already achieved decrease in the cyber defense capability of the adversary, nullifying or unbalancing the adversary’s possibilities of action or reaction.
498.
The offensive is achieved with cyber supremacy or cyber superiority, whether known or unknown by the adversary.
499.
Known cyber supremacy/superiority is reached when the adversary knows our movements on their networks and despite this, they do not have the ability to stop our freedom of action.
500.
Unknown cyber supremacy/superiority is reached when the adversary is unaware of our movements on their networks and because of that they do not take response actions to stop our freedom of action.
501.
Offensive cyber operations are intended to undermine the enemy’s operational capabilities in cyberspace, and this can be exploited by the cyberspace force or by forces from other domains. Areal case of joint exploitation of cyber operations occurred in the 2008 Russia-
Georgia conflict in South Ossetia, in which land operations were planned and conducted together with cyber operations.
502.
Mass is the concentration of the effects produced by the cyber defense capability, at the most advantageous place and time, to create decisive results for the mission.
503.
An example of mass is the distributed denial of service (DDoS) attacks that seek to saturate a service by flooding it with massive legitimate access requests. The DDoS attack proceeds from many points simultaneously on a single target making use of compromised network capability (Botnets
50
).
504.
Maneuver is the faculty of commanders to modify the orders issued and adapt them to variations in the mission and situation. It is essential in cyber defense, due to the need to adapt defensive and response measures to the continuous change in TTPs of cyber attacks and the need to modify the TTPs inoffensive actions to become effective in robust defenses.
505.
Economy of force is the efficient use of the available cyber defense resources by dedicating those that are essential for the fulfillment of the mission. This principle becomes highly relevant in an asymmetric environment where the resources necessary to defend against a cyber attack are usually much more expensive than those necessary to carryout the cyber attack.
506.
When cyber defense resources are scarce, cyber defense capabilities could be centralized at the joint level for more efficient use.
507.
Unity of command is the assignment of a single commander for each mission, operation or objective at all levels of cyber combat.
508.
Unity of command is especially relevant in cyber operations involving actors different from the cyber force, in the understanding that all cyber operations within the framework of national cyber defense must be led by the cyber force.
509.
Security is the ability to protect their own cyberspace against cyberattacks through proper prevention and reaction.
510.
Prevention requires measures to reject known and unknown cyber attacks or render them unproductive, as well as exploitative capability to provide accurate and timely information on the TTPs of potential adversaries in order to anticipate potential cyber attacks.


GUÍA DE

Download 2.54 Mb.

Share with your friends:
1   ...   57   58   59   60   61   62   63   64   ...   85




The database is protected by copyright ©ininet.org 2024
send message

    Main page