Cyber Primer
AEWhbF
AEWhbF
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
<strong>Cyber</strong> functions<br />
3.16. Indicators and warnings for Defence are often sourced through<br />
commerce (for example, anti-virus vendors or security operating centres) and<br />
the intelligence agencies. The Ministry of Defence’s (MOD’s) own CERT has<br />
prime responsibility for disseminating cyber indicators and warnings across<br />
Defence’s networks.<br />
<strong>Cyber</strong> operational preparation of the environment<br />
3.17. The fourth role in cyber operations – cyber operational preparation of<br />
the environment (cyber OPE) – is a vital enabling function which significantly<br />
enhances the effectiveness of other cyber operations. The role is split into<br />
passive operational preparation of the environment tasks (which include<br />
maintenance and integrity of connections, networks and software) and the<br />
more covert active ‘infrastructure’ activities.<br />
cyber operational preparation of the environment<br />
(cyber OPE)<br />
All activities conducted to prepare and enable cyber intelligence,<br />
surveillance and reconnaissance, defensive and offensive operations.<br />
Information management<br />
3.18. Acquiring, sharing, processing and protecting information is a<br />
vital supporting function to the four roles of cyber operations. Acquiring<br />
and sharing information through covert and open sources to multiple or<br />
collective locations should be timely, but must also maintain data integrity.<br />
These activities are non-discretionary.<br />
3.19. Information assurance activities should provide commanders with<br />
the confidence that their networks and systems will protect the information<br />
they handle and function as they need to, when they need to and under the<br />
control of legitimate users.<br />
a. The MOD Computer Emergency Response Team (MODCERT)<br />
is responsible for the information assurance of fixed and deployed<br />
networks.<br />
<strong>Cyber</strong> <strong>Primer</strong> (2nd Edition) 59