Cyber Primer
AEWhbF
AEWhbF
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
<strong>Cyber</strong> functions<br />
3.8. Computer Emergency Response Teams. Most governments, many<br />
universities and industries run CERTs. 39 In the main, these teams collaborate<br />
internationally on a voluntary basis to manage security aspects of<br />
cyberspace in near-real time. Most teams are members of the Forum for<br />
Incident Response and Security Teams (FIRST). Within Defence, cyber<br />
protection teams (CPTs) protect mission-critical assets including networks,<br />
data, information and systems.<br />
Offensive cyber operations<br />
3.9. Offensive cyber operations include activities that project force to<br />
create, deny, disrupt, degrade and destroy effects in and through cyberspace.<br />
These operations may transcend the virtual domain into effects in the<br />
physical and cognitive domains.<br />
offensive cyber operations<br />
(OCO)<br />
Activities that project power to achieve military objectives in, or<br />
through, cyberspace.<br />
3.10. Offensive cyber activity can be used to inflict temporary or permanent<br />
effects, thus reducing an adversary’s confidence in networks or capabilities.<br />
Such action can support deterrence by communicating intent or threats. At<br />
the operational/tactical level there is a need to coordinate between offensive<br />
cyber operations and information operations/activities.<br />
3.11. Offensive cyber activity can be simply categorised into seven phases,<br />
known as the cyber attack chain. These are commonly identified as:<br />
• understanding;<br />
• payload development;<br />
• delivery;<br />
• exploitation;<br />
• installation;<br />
39 Computer Emergency Response Team is now a registered service mark of Carnegie<br />
Mellon University that is licensed to other teams around the world. www.cert.org.<br />
56<br />
<strong>Cyber</strong> <strong>Primer</strong> (2nd Edition)