Cyber defense



Download 2.54 Mb.
View original pdf
Page51/85
Date09.12.2022
Size2.54 Mb.
#60094
1   ...   47   48   49   50   51   52   53   54   ...   85
Cyber Defense Handbook
Cyber arsenal
409.
The cyberspace force, like any military unit, needs weapons specially designed to cause specific effects in cyberspace, the consequences of which may transcend to the other domains.
410.
In order to have adequate armed capability to carryout its missions, the cyber force must establish mechanisms and procedures to acquire and develop cyber weapons and payloads to configure the cyber arsenal.
411.
Cyber weapons and payloads can be acquired on the global market, regular or irregular, through the national arms industry, or through self-development or cooperative development.
412.
National cyber defense needs a robust national cyber arms industry to avoid external dependency that may jeopardize current and future operations, as occurs with traditional domains.
413.
The cyber force needs to acquire cyber weapons on a regular basis and, furthermore, develop its own cyber weapons (new weapons, customizing known weapons or reusing captured weapons from cyber attacks it has sustained) and testing them in the cyber range.
414.
Cyber arsenal configuration is one of the cyber force’s most sensitive tasks and it must be done in such away that ensures that the cyber arsenal is secure (it must allow access only to authorized personnel, reliable (cyber weapons must be tested and frequently updated, guaranteeing that they perform as expected, recordable (it must record cyberweapon usage to avoid repetition in same objectives, scalable (it must easily allow increase) and complete (it must include all the cyber weapons required for the cyber attacks in the cyber force operations and missions).


GUÍA DE
CIBERDEFENSA
ORIENTACIONES PARA EL DISEÑO, PLANEAMIENTO, IMPLANTACIÓN Y DESARROLLO DE UNA CIBERDEFENSA MILITAR
63 Compared to traditional domains, the cyber force arsenal is more dynamic, continually incorporating new cyber weapons and redesigning old ones, so that cyber weapons used in a cyber attack cannot be detected through recognized fingerprints, and if they are detected, that they not be reused by the victim. For this reason, in many cases, they are single-use cyber weapons and are designed to self-destroy under certain conditions.

Download 2.54 Mb.

Share with your friends:
1   ...   47   48   49   50   51   52   53   54   ...   85




The database is protected by copyright ©ininet.org 2024
send message

    Main page