Cyber Primer
AEWhbF
AEWhbF
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Fundamentals of cyber<br />
can share a single persona; for example, a multi-user single email account.<br />
Attributing responsibility and targeting in cyberspace is difficult; personas<br />
can be complex, with elements in many virtual locations and not linked to<br />
a single physical location or form. Significant intelligence collection and<br />
analysis capabilities are required to gain sufficient insight and situational<br />
awareness to enable effective targeting and to create the desired effect.<br />
The social, people and persona layers can be further analysed through<br />
four sub-areas: social networking; operating and maintenance procedures;<br />
people; and security.<br />
a. Social networking. Social networking covers information regarding<br />
human interactions and may include details on culture, interests, how<br />
and with whom people communicate, and their persona or personas.<br />
b. Operating and maintenance procedures. Operating procedures<br />
across the breadth of cyber operations include network monitoring,<br />
information assurance, disaster recovery, contingency and backup<br />
plans. Maintenance includes the skill levels of the personnel<br />
maintaining the network and the frequency of maintenance activity.<br />
c. People. This refers to all individuals involved; including those<br />
developing and operating the various systems.<br />
d. Security. Security includes the security posture of the network and<br />
levels of awareness of the network users, managers and maintainers.<br />
1.14. Information layer. The information layer consists of the connections<br />
that exist between network nodes. A node is a physical device connected to<br />
a network, such as a computer, smartphone or other mobile device. It also<br />
includes:<br />
• individual network configuration;<br />
• data, applications and protocols which govern interaction across the<br />
physical layer;<br />
• information assurance processes;<br />
8<br />
<strong>Cyber</strong> <strong>Primer</strong> (2nd Edition)