Cyber defense



Download 2.54 Mb.
View original pdf
Page39/85
Date09.12.2022
Size2.54 Mb.
#60094
1   ...   35   36   37   38   39   40   41   42   ...   85
Cyber Defense Handbook
FIGURE 25.
COOPERATION


GUÍA DE
CIBERDEFENSA
ORIENTACIONES PARA EL DISEÑO, PLANEAMIENTO, IMPLANTACIÓN Y DESARROLLO DE UNA CIBERDEFENSA MILITAR
52
critical capabilities depends on the avoidance of dependence on the private sector, and it is paramount to establish mechanisms that guarantee continued operation of critical capabilities of the cyber force, in the cases in which the corresponding supplier company files for bankruptcy or requires unacceptable conditions.
309.
It is necessary to establish specific cooperation environments or agreements with the industry that will allow the cyber force access to the intellectual property and basic knowledge of the products, tools or critical systems acquired, so that, in case of the disappearance or a soured relationship with the provider company the cyber force can continue its operations.
310.
Academia is another of the pillars for the development of cyber defense technologies, hence, the cyber force must promote cooperation agreements with universities, research and development centers, foundations and think-tanks that promote innovation and development of cyber defense technologies.
311.
Internal cooperation is the collaboration founded between all the cyber force units and between command, operational and technical capabilities. All cyber force units must cooperate with each other to achieve the strategic objectives that the commander has identified in the development plan. This is the most necessary cooperation, alas, it is frequently the most forgotten.
312.
Internal cooperation is complicated due to the need to reconcile information exchange between units and confidentiality of many activities. Cooperation and confidentiality are two fundamental aspects that must be considered together, designing mechanisms that promote information exchange within secure environments. One thing to avoid, by all means, is for confidentiality to be used as an excuse to create watertight compartments that deny flow of information between the parties in need.
Representation
313.
There are numerous national and international forums, where important and interesting cyber defense issues are discussed and decided. The cyber force must identify the most relevant, and actively participate in them to learn firsthand about the national or international situation of cyber defense and to influence decision-making to serve, as far as possible, its strategic objectives.
314.
The cyber force must assert its role as the primary head of national cyber defense to represent the country in cyber defense matters in international and national forums, ahead of other parties involved (national security agencies, intelligence services, law enforcement, etc) with less responsibility for national cyber defense. The difference between national cybersecurity and national cyber defense have to be explicitly stated in all related national level documents, such as the national defense policy or the national cybersecurity strategy.

Download 2.54 Mb.

Share with your friends:
1   ...   35   36   37   38   39   40   41   42   ...   85




The database is protected by copyright ©ininet.org 2024
send message

    Main page