1 / 15

The Science Technology of Cyber Operations 16 June 2009

Joint Publication 1-02, Department of Defense Dictionary of Military and Associated Terms, defines: ??cyberspace as a global domain within the information environment consisting of the interdependent network of information technology infrastructures, including the Internet, telecommunications networks, computer systems, and embedded processors and controllers"?and?cyberspace operations as the employment of cyber capabilities where the primary purpose is to achieve military objectives or effects in or through cyberspace." .

joann
Download Presentation

The Science Technology of Cyber Operations 16 June 2009

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


    2. Joint Publication 1-02, Department of Defense Dictionary of Military and Associated Terms, defines:  “cyberspace as a global domain within the information environment consisting of the interdependent network of information technology infrastructures, including the Internet, telecommunications networks, computer systems, and embedded processors and controllers”  and “cyberspace operations as the employment of cyber capabilities where the primary purpose is to achieve military objectives or effects in or through cyberspace." Definitions

    3. Global Vigilance, Global Reach and Global Power across the full spectrum of conflict from peacetime to major combat operations drives the S&T requirements for cyber operations. US Air Force Vision

    4. Global Vigilance is the ability to keep an unblinking eye on any entity - to provide warning on capabilities and intentions, as well as identify needs and opportunities 1. Primary technical challenges for Global Vigilance: (1) situational awareness (2) assurance and trust (3) threat avoidance 1 Gen Norton A. Schwartz, “Fly, Fight and Win”, CSAF’s Vector, September 2008 .  Global Vigilance

    5. “The perception of the elements in the environment within a volume of time and space, comprehension of their meaning, and projection of their status in the near future." Perception: transformation of signals into alerts. Comprehension: contextual placement. Projection: risks, opportunities, and next steps. Endsley, M.R. “Toward a Theory of Situation Awareness in Dynamic Systems” (1995), Human Factors 37 (1). Situational Awareness

    6. Mission Assurance: “process to ensure that assigned tasks or duties can be performed in accordance with the intended purpose or plan – a summation of activities and measures to ensure that required capabilities and all supporting infrastructures are available to carry out the National Military Strategy.“ Information Assurance: "measures that protect and defend information and information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation".  Trust: in hardware, software and information – integrity of data at rest and data in motion. Assurance and Trust

    7. “A strategic defensive strategy that can reduce or eliminate the need to fight a threat.” Deterrence: credible threat of retaliation through timely detection and attribution. The defender must possess both the means and the will to retaliate. Domain Modification, Polymorphism: Rewrite the laws that define the domain to favor the defense. Agility: establish indications and warnings of anomalies, rapid analysis of future effects, and effective provisioning of defense – tactics. Threat Avoidance

    8. Global Reach is the ability to move, supply and position assets - with unrivaled velocity and precision anywhere. Relies on defensive measures when situation moves from peace towards conflict (1) Access technologies to position and deploy cyber assets (2) Survival in a contested cyber environment (3) Cross-domain superiority for C2 Global Reach

    9. In all domains, access refers to deploying and positioning friendly forces across blue, gray and red spaces. While traditional domains are fixed in size – the amount of available land, sea, air and space is essentially constant – the cyberspace domain changes dynamically, and increases indefinitely in size, creating unique technical challenges for the positioning of cyber assets. Access

    10. When an attack evades detection and defeat, priority turns to survival and mission assurance Fight Through: collaborative trusted agents that execute the commander's against a dynamic cyber threat improve survival Recovery: synthetic diversity by removing monoculture vulnerabilities. Mission-Aware Systems: IA-enabled MA by reconfiguring resources to provide an acceptable level of service and security. Survival

    11. Robust modeling and simulation, and realistic war gaming of integrated effects delivery from every domain against red and blue systems in every domain. Identify Friend or Foe (IFF) procedures and cross-domain fratricide avoidance. Cross-Domain C2: enables MEF execution in a contested cyber domain, and permits achieving objectives in all domains. Cross Domain Operations

    12. Global Power is the ability to hold at risk or strike any target, anywhere, and project swift, frequently decisive, precise effects. Delivery of Global Power requires command and control of cyberspace, on which modern US military capability depends. The global projection of cyber power to complement or enable kinetic power creates S&T challenges of (1) Developing precise cyber munitions, (2) Estimating first, second and higher-order effects (3) Taking response action to external events. Global Power

    13. Measuring the effects of cyber operations depend on the expertise of the operator. Robust Effects across the entire spectrum of conflict. Sustained Cyberspace Operations: Second- and higher-order effects extend beyond specific system. Cross-Domain Effects in other domains beyond land, sea, air, space and cyberspace, to Diplomatic, Information, Military and Economic (DIME) effects. Delivering Precision Effects

    14. Cyber Effects-Based Assessment (EBA) quantify outcome of a cyber operation. Relationship between physical EBA and mission EBA Effects on Systems: Measures of Effectiveness (MOE) assess higher-order effects against target. Effects on Users: influence the thinking and actions of users, from single user to society. Cyber Effects Assessment of Kinetic Operations: fusion of cyber ISR with traditional ISR. Cyber Effects-Based Assessment

    15. Computer Network Defense Response Action (CND-RA) to defend blue forces against adversary attack in real time during cyber mission.  RA focuses primarily on blue response to an asymmetric hostile cyber action and must become integral part of operation planning of kinetic actions. Attack Containment: Rapid forensics play an integral role in CND-RA by detecting & attributing attacks, estimating damage and enabling response Offensive Response Action: technical and legal challenges arise in using offensive operations to defeat an attack. Response Action

    16. The US Air Force depends vitally on cyberspace to achieve its vision of Global Vigilance, Global Reach and Global Power across the spectrum of conflict. Global Vigilance at peacetime requires persistent situational awareness in all domains, mission and information assurance, and threat avoidance through deterrence and technology. Global Reach requires access to the battle space, survival and fighting through cyberspace attacks, and integrated planning of mission essential functions and their dependence on cyberspace. Global Power calls for predominantly offensive combat operations, enabled through the delivery of precision effects in cyberspace, reliable effects assessment and automated response action. Conclusion

More Related