Cyber defense



Download 2.54 Mb.
View original pdf
Page6/85
Date09.12.2022
Size2.54 Mb.
#60094
1   2   3   4   5   6   7   8   9   ...   85
Cyber Defense Handbook
Cyber weapon
Cyber weapon system
Cyberspace
Domain of operations
Hacktivism
Information system
Software and TTPs specifically designed to cause damage to a cyber ecosystem component.
A system that integrates different cyber weapons, command and control functions and all the technical support necessary to implement an offensive, defensive or exploitative cyber operation with a specific strategic, operational or tactical objective.
The notional environment in which communication over computer networks occurs. (Oxford Dictionary).
The sphere of interest and influence in which activities, functions, and operations are undertaken to accomplish missions and exercise control over an opponent in order to achieve desired effects. (NATO Bi-SC Initial Assessment of Recognising Cyberspace as a Domain).
The use of cyberspace to carryout civil disobedience, propaganda or proselytizing activities to promote political or social change.
The set of logical computing resources that facilitate information management fora specific purpose (logistics, command and control, weapons management, financial and human resources, etc.).
GUÍA DE
CIBERDEFENSA
ORIENTACIONES PARA EL DISEÑO, PLANEAMIENTO, IMPLANTACIÓN Y DESARROLLO DE UNA CIBERDEFENSA MILITAR
13


GUÍA DE
CIBERDEFENSA
ORIENTACIONES PARA EL DISEÑO, PLANEAMIENTO, IMPLANTACIÓN Y DESARROLLO DE UNA CIBERDEFENSA MILITAR
14


GUÍA DE
CIBERDEFENSA
ORIENTACIONES PARA EL DISEÑO, PLANEAMIENTO, IMPLANTACIÓN Y DESARROLLO DE UNA CIBERDEFENSA MILITAR
15 001.
Cyberspace is the conceptual domain where cyber defense activities take place, therefore it is vitally important to have a clear and precise idea of its nature and particularities. According to the Oxford dictionary, cyberspace is the notional environment in which communication over computer networks occurs This definition fits the implicit meaning of this guide.
003.
Cyberspace is a concept, idea, or notion it is not a material, physical, visible or tangible space. Since cyberspace is a notion, then no physical or tangible components, such as IT infrastructure, hardware or people, are an intrinsic part of it. Non-tangible components such as information, software or electric power are also not intrinsically part of it.
004.
The notion of cyberspace is materialized through the interrelation of specific components (IT
infrastructure, software, information, transportation, electric power and people) providing it with vitality.
005.
Cyberspace, the components and their relationships makeup the cyber ecosystem (para. 524). In practice, the term cyberspace is used to include the components and their relationships, assimilating it to the term cyber ecosystem. Usually, cyberspace is identified with the IT infrastructure (computers, servers, wiring, IT devices and hardware, which would seem to make it more understandable but this cyber-IT identification carries the great danger of digressing from the true purpose of cyber defense.
007.
This cyber-IT misperception is a source of conflict between cyber defense units, in charge of planning and conducting military operations in the cyberspace domain of operations, and CIS or Signal units, in charge of providing cross- domain telecommunications service to all domain of operations.
008.
Information is not an intrinsic part of cyberspace, but cyberspace is an ideal environment to manage it (create, present, process, store, transport, share, and delete. Cyberspace, however, is not the only environment where information can be tackled.
009.
People, individually or in organized groups, are not intrinsic part of cyberspace, just as they are not part of any other domain (land, air and sea. People create and modify cyberspace they perform activities, functions and operations in cyberspace, but they are not part of cyberspace.
010.
Finally, two components that keep cyberspace alive are important to mention software and electric
power. These are the two basic components to maintain cyberspace’s vital signs.

Download 2.54 Mb.

Share with your friends:
1   2   3   4   5   6   7   8   9   ...   85




The database is protected by copyright ©ininet.org 2024
send message

    Main page