29.07.2016 Views

Cyber Primer

AEWhbF

AEWhbF

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Integrating cyber operations<br />

physical interdependencies of information communication technology (ICT)<br />

or have access to subject matter experts.<br />

4.14. Technical specialists. Technical specialists need current, expert<br />

knowledge of a range of operating systems and applications. Civilian<br />

training is supplemented by specialist military, government and commercial<br />

courses.<br />

4.15. Specialist organisations. Defence’s cyber resources are centrally<br />

managed by the Joint Forces <strong>Cyber</strong> Group in consultation with the single<br />

Services and civilian agencies. Teams of cyber specialists will operate at<br />

different levels, have varying skill sets and be in geographically dispersed<br />

units. Manpower will be sourced from:<br />

• in-house and external specialist trained personnel (regular and/or<br />

reserve);<br />

• secondments from civilian companies; and<br />

• service level agreements with contractors.<br />

Operating in cyberspace<br />

4.16. Defensive preparedness. All personnel working with ICT need to have<br />

the confidence to recognise, respond to and recover from cyber attacks.<br />

Policies and practices in accordance with Joint Service Publication (JSP) 440,<br />

The Defence Manual of Security and JSP 541, MOD Information Security and<br />

Computer Network Defence Organisation and Reporting Procedures need to be<br />

developed and rehearsed to manage our activities.<br />

a. Systems security. Using appropriate warning systems,<br />

up-to-date anti-virus software and continuous ‘patching’ (updating)<br />

of operating systems/applications is the most common and effective<br />

form of preparedness. Similarly, educating and training operators will<br />

ensure they are aware of, and prepared for, the latest forms of attack.<br />

All personnel should be continuously asking themselves what their<br />

alternatives are if their computer systems fail. We all must, therefore,<br />

understand and practise business continuity plans. It is crucial that<br />

<strong>Cyber</strong> <strong>Primer</strong> (2nd Edition) 73

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!