International Cyber Terrorism
International Cyber Terrorism
International Cyber Terrorism
- No tags were found...
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
IV. Proactive <strong>Cyber</strong>-Defense<br />
Strategically, cyber defense refers to operations that are conducted in the cyber domain<br />
in support of mission objectives. To help understand the practical difference between<br />
cyber security and cyber defense, is to recognize that cyber defense requires a shift<br />
from network assurance (security) to mission assurance where cyber defense is fully<br />
integrated into operational planning across the Joint Functions. <strong>Cyber</strong> defense focuses<br />
on sensing, detecting, orienting, and engaging adversaries in order to assure mission<br />
success and to out-maneuver that adversary. This shift from security to defense<br />
requires a strong emphasis on intelligence, surveillance and reconnaissance, and the<br />
integration of staff activities to include intelligence, operations, communications, and<br />
planning. Defensive cyber operations refer to activities on or through the global<br />
information infrastructure to help protect and institutions’ electronic information and<br />
information infrastructures as a matter of mission assurance. Does not normally involve<br />
direct engagement with the adversary.<br />
The distinction between cyber defense, active cyber defense, proactive cyber defense<br />
and offensive cyber operations has been influenced by doctrine, pragmatics of<br />
technology or tradecraft and legal thresholds.<br />
Page 73 of 174