29.07.2016 Views

Cyber Primer

AEWhbF

AEWhbF

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Fundamentals of cyber<br />

can share a single persona; for example, a multi-user single email account.<br />

Attributing responsibility and targeting in cyberspace is difficult; personas<br />

can be complex, with elements in many virtual locations and not linked to<br />

a single physical location or form. Significant intelligence collection and<br />

analysis capabilities are required to gain sufficient insight and situational<br />

awareness to enable effective targeting and to create the desired effect.<br />

The social, people and persona layers can be further analysed through<br />

four sub-areas: social networking; operating and maintenance procedures;<br />

people; and security.<br />

a. Social networking. Social networking covers information regarding<br />

human interactions and may include details on culture, interests, how<br />

and with whom people communicate, and their persona or personas.<br />

b. Operating and maintenance procedures. Operating procedures<br />

across the breadth of cyber operations include network monitoring,<br />

information assurance, disaster recovery, contingency and backup<br />

plans. Maintenance includes the skill levels of the personnel<br />

maintaining the network and the frequency of maintenance activity.<br />

c. People. This refers to all individuals involved; including those<br />

developing and operating the various systems.<br />

d. Security. Security includes the security posture of the network and<br />

levels of awareness of the network users, managers and maintainers.<br />

1.14. Information layer. The information layer consists of the connections<br />

that exist between network nodes. A node is a physical device connected to<br />

a network, such as a computer, smartphone or other mobile device. It also<br />

includes:<br />

• individual network configuration;<br />

• data, applications and protocols which govern interaction across the<br />

physical layer;<br />

• information assurance processes;<br />

8<br />

<strong>Cyber</strong> <strong>Primer</strong> (2nd Edition)

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!