Cyber Primer
AEWhbF
AEWhbF
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
<strong>Cyber</strong> functions<br />
b. Defence Assurance and Information Security (DAIS) is the Defence<br />
lead for information assurance. The Joint Information Assurance<br />
Coordination Cell (JIACC) coordinates all non-accreditation activity.<br />
c. The Joint Security Coordination Centre (JSyCC) is part of DAIS,<br />
they conduct and coordinate all MOD information security incident<br />
management and related risk analysis activity.<br />
3.20. An effective approach to information sharing and interoperability of<br />
cyber activity requires information and intelligence to be shared. A balance<br />
must be struck between the ‘need to protect’ for security and the ‘need to<br />
share’ for mission success. Operations security is critical for effective cyber<br />
operations and must never be compromised.<br />
<strong>Cyber</strong> littorals<br />
3.21. Much of the early and continuing cyber capability development is<br />
a result of innovation from communities within other areas of traditional<br />
war fighting. These other capabilities (where data is understood and<br />
manipulated in other ways) can be referred to as cyber littorals. The nature<br />
of cyberspace is such that it is closely integrated with the maritime, land,<br />
and air and space environments (as shown in Figure 3.2) and has symbiotic<br />
relationships with other military capabilities. These include:<br />
• information operations (Info Ops) and information activities; 42<br />
• electromagnetic activities (EMA); 43<br />
• signals intelligence (SIGINT); and<br />
• communication and information systems (CIS).<br />
3.22. These capabilities use different approaches where data is both<br />
manipulated and understood. Such capabilities will need to be managed to<br />
achieve success on military operations.<br />
42 Such as psychological operations, deception and operations security.<br />
43 For the context of this <strong>Primer</strong>, electromagnetic activities is limited to electromagnetic<br />
spectrum operations and electromagnetic warfare.<br />
60<br />
<strong>Cyber</strong> <strong>Primer</strong> (2nd Edition)