Unit 12: Cyber 101 Flashcards
5 Cyberspace Characteristics
- Scope of existence - cyberspace exists across the air, land, maritime, and space domains
- Non-continous domain - Protocols, firewalls, encryption, etc. isolate networks from each other
- Heterogenous domain - made up of many different types of networks with many different functions
- Volatile and Fast - segments continuously change and operations occur very fast
- Contains logical and physical maneuver space - logical consist of IP addresses/protocols, physical consist of frequencies
Cyberspace superiority
The degree of advantage possessed by one force over another that permits the conduct of ops in cyberspace without prohibitive interference by the opposing force
Counter-cyber
Integrates offensive and defensive operations to maintain superiority
Offensive Counter Cyber (OCC)
Offensive operations to deny , degrade, etc an adversary’s ability to use cyberspace
Defensive Counter Cyber (DCC)
Defensive measures designed to detect, identify, etc enemy forces attempting to penetrate attack through cyberspace
Title 18
Law enforcement
Title 50
Intelligence
Title 10
Wartime
Cyberspace Control
Construct defining measures:
- Authority to approve offensive actions
- Conduct proportionate cyber actions
- Ensure tactical/operational integration and deconfliction
- Arbitrate conflicting cyber actions
Cross-Domain Operations
Capabilities to leverage achieve effects in other domains:
- Disruption of adversary integrated air defense
- Control of floodgates to disrupt enemy movements
- Control of power grids to disrupt operations
Supervisory Control and Data Acquisition (SCADA)
Employed to control, manage large complex systems such as industrial systems
Operational Considerations
- Ensure friendly freedom of action in cyberspace
- Countering the adversary’s malicious use of cyberspace (kinetic/non-kinetic means)
- Gaining access to systems that enable cyberspace ops
- Achieving effects in support of the Joint Force Commander’s (JFC) objectives
Cyberspace objectives
3 key strategic objectives:
- Establishing the domain - NetOps
- Controlling the domain - Counter cyber
- Using the domain - includes all airmen, military, civilian, and contractor personnel
Joint Publication 3-13
Defines Information Operations (IO) as the integrated employment of Electronic Warfare, etc
JP 1-02
Defines Information Assurance (IA) shields and preserves information and information systems