Cyber Operations

Cyber Operations

Cyber Operations (CO) is a classification of military operations that use of Computer Network Attack (CNA), Computer Network Defense (CND), Computer Network Exploitation (CNE) against an enemy to achieve military objectives.[1]

Contents

History

The Civilian Information Infrastructure (CII) is composed of the power, communications, transportation, services and supporting structures that form the backbone for the exchange of information. The CII is of critical importance to the proper functioning of modern developed nations and to the world at large.[2][3] CO evolved out of the need to protect and attack CII and its military counterpart starting in the late 1980s[4] (e.g. Morris Worm of 1988). CO, as a major and integrated military doctrine, started to take shape following the September 11 attacks on the United States.[1]

Activities

Activities associated with CO are:

Wargames & Exercises

  • Cyber and Air Joint Effects Demonstration (CAAJED)[8]

Modeling and Simulation

The Department of Defense has various Modeling & Simulation efforts to represent recipients and effects of CNA, CND, and CNE.[9]

See also

References

  1. ^ a b "The National Military Strategy for Cyberspace Operations", Chairman of the Joint Chiefs of Staff, DoD, December 2006 [1]
  2. ^ "Cyber Operations and Cyber Terrorism", Handbook No. 1.02, United States Army Deputy Chief of Staff for Intelligence(DCSINT) G-2, 15 August 2005 [2]
  3. ^ Baldor, Lolita C., "US officials eye North Korea in cyber attack", 9 July 2009 [3]
  4. ^ Whitaker, Randall, "Information Warfare Bibliography, 7 June 1998 [4]
  5. ^ "Information Operations", Joint Publication 3-13, Chairman of the Joint Chiefs of Staff, DoD, 13 February 2006 [5]
  6. ^ "Electronic Warfare", Joint Publication 3-13.1, Chairman of the Joint Chiefs of Staff, DoD, 25 January 2007 [6]
  7. ^ "Public Affairs", Joint Publication 3-61, Chairman of the Joint Chiefs of Staff, DoD, 9 May 2005 [7]
  8. ^ "Cyber and Air Joint Effects Demonstration - In House Final Technical Memorandum", Air Force Research Laboratory, AFRL-RI-RS-TM-2008-12, March 2008 [8]
  9. ^ Gonzalez, Joe R. Jr., "Modeling Computer Network Attack of the Civilian Information Infrastructure in OneSAF", I/ITSEC, 2008 [9]

Wikimedia Foundation. 2010.

Игры ⚽ Нужно сделать НИР?

Look at other dictionaries:

  • Cyber-warfare — (also known as cybernetic war [Jonathan V. Post, Cybernetic War, Omni, May 1979, pp.44 104, reprinted The Omni Book of Computers Robots , Zebra Books, ISBN 0 8217 1276] , or cyberwar ) is the use of computers and the Internet in conducting… …   Wikipedia

  • Cyber security standards — are security standards which enable organizations to practice safe security techniques to minimize the number of successful cyber security attacks. These guides provide general outlines as well as specific techniques for implementing cyber… …   Wikipedia

  • Cyber spying — or Cyber espionage is the act or practice of obtaining secrets without the permission of the holder of the information (personal, sensitive, proprietary or of classified nature), from individuals, competitors, rivals, groups, governments and… …   Wikipedia

  • Cyber electronic warfare — (cyber EW) is any military action involving the use of electromagnetic energy to control the domain characterized by the use of electronics and the electromagnetic spectrum to store, modify, and/or exchange data via networked systems and… …   Wikipedia

  • Cyber Knight — Super NES cover art Developer(s) Group SNE[1] …   Wikipedia

  • Cyber Troopers Virtual-On: Operation Moongate — Developer(s) Sega AM3 Publisher(s) Sega …   Wikipedia

  • Cyber War — Zweiter Weltkrieg: Frankreich. Nachrichtenhelferinnen an Vermittlungspult/Telefonanlage: PK KBK Lw zbV (Deutsche Wehrmacht; Bild: Bundesarchiv) Cyberwar ist ein Kofferwort aus den englischen Wörtern …   Deutsch Wikipedia

  • Cyber security and countermeasure — Cybercrime (or computer crime) refers to any crime that involves a computer and a network.[1] In general, a countermeasure is a measure or action taken to counter or offset another one. In computer security a countermeasure is an action, device,… …   Wikipedia

  • Cyber-terroristes — Terrorisme Le terrorisme est l emploi de la violence (attentats, assassinats, enlèvements, ...) à des fins politiques, de telle sorte que leur retentissement psychologique – terreur et peur – dépasse largement le cercle des victimes directes pour …   Wikipédia en Français

  • cyber counterintelligence — Measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and… …   Military dictionary

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”