14.02.2016 Views

SCHOOL THESIS

?view&did=788526

?view&did=788526

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

. Comprehensive National Cybersecurity Initiative (2008) .....44<br />

c. Cyberspace Policy Review (2009)...........................................45<br />

d. National Security Strategy (2010) ..........................................46<br />

e. U.S. International Strategy for Cyberspace (2011) ...............46<br />

f. PPD-20, U.S. Cyber Operations Policy (2012) ......................47<br />

2. Department of Defense ......................................................................48<br />

a. National Military Strategy for Cyberspace Operations<br />

(2006).......................................................................................48<br />

b. Unified Command Plan (2011)...............................................48<br />

c. National Military Strategy (2011)...........................................49<br />

d. CJCS Volume VI Emergency Action Procedures (2012)......50<br />

e. Joint Publication 3–12, Cyberspace Operations (2013) ........50<br />

D. CANADIAN NATIONAL CYBERSPACE GUIDANCE ..........................51<br />

1. Executive Branch ...............................................................................51<br />

a. Canada’s Cyber Security Strategy (2010) ..............................51<br />

b. Action Plan 2010–2015 (2013) ...............................................51<br />

2. Department of National Defence ......................................................52<br />

a. Canada First Defence Strategy (2013)...................................52<br />

b. Canadian Forces Cyber Operations Primer (2014)...............52<br />

E. SUMMARY ....................................................................................................52<br />

IV. COURSES OF ACTION DEVELOPMENT ...........................................................55<br />

A. METHODOLOGY ........................................................................................55<br />

B. COA #1 DESCRIPTION (FULL NORAD CYBER CONFERENCE<br />

PARTICIPATION) ........................................................................................56<br />

1. Definition ............................................................................................56<br />

2. Discussion............................................................................................56<br />

3. Advantages..........................................................................................56<br />

4. Disadvantages and Proposed Solutions ............................................57<br />

C. COA #2 DESCRIPTION (NORAD ALL-DOMAIN WARNING<br />

PRODUCTION) .............................................................................................57<br />

1. Definition ............................................................................................57<br />

2. Discussion............................................................................................57<br />

3. Advantages..........................................................................................58<br />

4. Disadvantages and Proposed Solutions ............................................58<br />

D. COA #3 DESCRIPTION (JOINT NORAD + USCYBERCOM<br />

CYBER ATTACK ASSESSMENT) .............................................................59<br />

1. Definition ............................................................................................59<br />

2. Discussion............................................................................................59<br />

3. Advantages..........................................................................................59<br />

4. Disadvantages and Proposed Solutions ............................................60<br />

E. SUMMARY ....................................................................................................61<br />

V. COURSES OF ACTION ANALYSIS ......................................................................63<br />

A. METHODOLOGY ........................................................................................63<br />

B. COA #1 ANALYSIS (FULL NORAD CYBER CONFERENCE<br />

PARTICIPATION) ........................................................................................64<br />

viii

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!