29.07.2016 Views

Cyber Primer

AEWhbF

AEWhbF

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Fundamentals of cyber<br />

• details of communication service providers;<br />

• transfer protocols;<br />

• Internet domain names; and<br />

• ownership data.<br />

1.15. Network layer. The network layer uses logical constructs as the<br />

primary method of security (for example, information assurance) and<br />

integrity. This layer can often (but not exclusively) be the target for: signals<br />

intelligence; cyber intelligence, surveillance and reconnaissance; and<br />

measurement and signature intelligence.<br />

1.16. Real layer. The real layer consists of a geographic aspect and a physical<br />

aspect. The geographic aspect relates to the location of elements of a<br />

network, such as under the sea or ground, or in a building. The physical<br />

aspect concerns what components are present – such as hardware, systems<br />

software and infrastructure.<br />

The cyber operating environment<br />

1.17. As a relatively new operating environment, Defence continues to<br />

develop the means by which to exploit cyberspace and the cyber operating<br />

environment to its best advantage. <strong>Cyber</strong>space is even contested in<br />

peacetime – threat actors are constantly probing our networks seeking<br />

vulnerabilities, intelligence or military and commercial advantage.<br />

1.18. The concept of near, mid and far operating spaces help explain the<br />

cyber environment and how it might affect operations.<br />

a. Near. The near comprises networks and systems that are controlled<br />

and assured by the commander, or controlled and assured on their<br />

behalf by Defence.<br />

b. Mid. The mid comprises networks and systems that are critical to<br />

the operation or campaign, but are not controlled and assured by the<br />

commander. They may be controlled and assured on their behalf by a<br />

<strong>Cyber</strong> <strong>Primer</strong> (2nd Edition) 9

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!