Ws-17 Cyberspace – Knowledge Flashcards
Define cyberspace and cyber superiority.
Cyber Superiority: Operational advantage in, through, and from cyberspace to conduct operations at a given time and in a given domain without prohibitive interference.
Cyberspace:
National Security Presidential Directive 54
1. “The interdependent network of information technology infrastructures, and includes the Internet, telecommunications networks, computer systems, and embedded processors and controllers in critical industries.”
Department of Defense
1. “A global domain within the information environment consisting of the interdependent network of information technology infrastructures, including the Internet, telecommunications networks, computer systems, and embedded processors and controllers.”
Cyberspace Domain
1. A man-made, interconnected operational realm characterized by use of the electromagnetic spectrum to manipulate information.
Identify specific threats and vulnerabilities associated with cyberspace operations.
Threats: i. User Error ii. Nation States iii. Insider Threats iv. Hacker Criminals v. Extremists/Terrorist Vulnerabilities: i. Operating systems ii. Poor practices iii. Applications iv. Operator
Define the unique relationship of the cyberspace domain to other air and space domains according to the Airman’s perspective of cyberspace.
Airmen think of airpower & the application of force from a functional rather than geographical perspective.
Airmen leverage speed, range, flexibility, precision, time, and lethality to create effects from and within all domains. Cyberspace operations are intrinsic to the conduct of modern airpower. Airmen conduct greatest percentage of global operations. Operations should be tightly integrated with capabilities of the air and space domains and should be commanded by an Airman who takes a broader view of war
State the roles and responsibilities of all Cyber Wingman.
Become a cyber defender.
Don’t open attachments or click on links unless the email is digitally signed.
Don’t connect any hardware or download any software, applications, music or information onto our network without approval.
Encrypting sensitive but unclassified and/or mission critical information.
Have a general understanding of the cyberspace domain as well as basic threats, vulnerabilities, and common countermeasures that any Airman can employ.