29.07.2016 Views

Cyber Primer

AEWhbF

AEWhbF

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>Cyber</strong> functions<br />

b. Defence Assurance and Information Security (DAIS) is the Defence<br />

lead for information assurance. The Joint Information Assurance<br />

Coordination Cell (JIACC) coordinates all non-accreditation activity.<br />

c. The Joint Security Coordination Centre (JSyCC) is part of DAIS,<br />

they conduct and coordinate all MOD information security incident<br />

management and related risk analysis activity.<br />

3.20. An effective approach to information sharing and interoperability of<br />

cyber activity requires information and intelligence to be shared. A balance<br />

must be struck between the ‘need to protect’ for security and the ‘need to<br />

share’ for mission success. Operations security is critical for effective cyber<br />

operations and must never be compromised.<br />

<strong>Cyber</strong> littorals<br />

3.21. Much of the early and continuing cyber capability development is<br />

a result of innovation from communities within other areas of traditional<br />

war fighting. These other capabilities (where data is understood and<br />

manipulated in other ways) can be referred to as cyber littorals. The nature<br />

of cyberspace is such that it is closely integrated with the maritime, land,<br />

and air and space environments (as shown in Figure 3.2) and has symbiotic<br />

relationships with other military capabilities. These include:<br />

• information operations (Info Ops) and information activities; 42<br />

• electromagnetic activities (EMA); 43<br />

• signals intelligence (SIGINT); and<br />

• communication and information systems (CIS).<br />

3.22. These capabilities use different approaches where data is both<br />

manipulated and understood. Such capabilities will need to be managed to<br />

achieve success on military operations.<br />

42 Such as psychological operations, deception and operations security.<br />

43 For the context of this <strong>Primer</strong>, electromagnetic activities is limited to electromagnetic<br />

spectrum operations and electromagnetic warfare.<br />

60<br />

<strong>Cyber</strong> <strong>Primer</strong> (2nd Edition)

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!