Cyber Primer
AEWhbF
AEWhbF
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Fundamentals of cyber<br />
third party – for example, a commercial company or other government<br />
department.<br />
c. Far. The far comprises networks and systems that, if influenced,<br />
will prove critical to the operation or campaign. Such systems will be<br />
predominately outside friendly forces control or assurance and are<br />
likely to be owned by third parties. 8<br />
1.19. There are a number of themes which emerge when we consider the<br />
cyber environment. Some of these include the following.<br />
a. The cyber operating environment is largely global, but vulnerable.<br />
b. Civilian and military information infrastructures, whether national,<br />
coalition or international, co-exist and overlap, posing problems for<br />
managing security in a network-enabled Defence capability.<br />
c. A high baseline for cyber security is required which has<br />
implications for education and training, timeliness of system<br />
maintenance and intelligence (cyber situational awareness).<br />
d. The threat in, and through, cyberspace is largely, but not<br />
exclusively, against the exploitation, manipulation and theft of<br />
information held across the Defence enterprise (this includes close<br />
collaborative defence of its civilian procurement, logistics and other<br />
support contractors 9 ).<br />
8 Systems owned by third parties are more vulnerable as they could be influenced by<br />
our adversaries.<br />
9 The likely interdependencies of critical information infrastructures mean that<br />
successful attacks may not only come from unexpected quarters, but also have<br />
unexpected impacts.<br />
10<br />
<strong>Cyber</strong> <strong>Primer</strong> (2nd Edition)