logo

Cyber Operations: Fog of War, Information Environment, and Decision Making

   

Added on  2023-01-17

6 Pages1243 Words39 Views
7COM1069 : Cyber
Operations
1
Cyber Operations: Fog of War, Information Environment, and Decision Making_1
Table of Contents
INTRODUCTION...........................................................................................................................3
REFERENCES................................................................................................................................6
2
Cyber Operations: Fog of War, Information Environment, and Decision Making_2
INTRODUCTION
Cyber security has become a major issue in recent times. Many countries are facing a big
problem as they are not able to maintain security of data. The area of cyber space has increased
and several other components are involved in it. So, it is improving the capabilities of cyber war
fare. Through it, they are able to breach data and info. In addition, nations are trying to engage
into political and military war in cyber space (Berger, 2017). Now a days, telecommunication
and satellite is highly useful component. Black hat hackers are specialist in hacking of data in
cyber space. Cyber operations are those that are conducted within cyber space. It contain transfer
of data, developing policies, using computer systems, etc.
This report will discuss about different topics that are fog of war, information
environment and decision making in cyber.
Fog of war in cyber space – it refers to that how at national and international level the cyber
thefts are happening. In present technological world, it has become complex to maintain cyber
security and crucial information. It has resulted in cyber war as hackers are hacking data of
nation. Here, the main countries that are having cyber warfare capabilities are Russia and China.
In cyber space there are many black hat hackers available. They play major role in hacking data
for financial gain. Black differ from white because they are security specialist who find out
methods to reach security. Generally, hackers breach into national cyber security database. It
enables to break protocols and exploit data. For of war in cyber space has increased to a great
extent. Now, many countries are engaged into this to obtain data and info. Russia and China try
to steal data of other countries (Betz, 2017). thus, area of cyber space is growing at rapid rate.
So, each nation is trying to engage in this more, it has led to war between them. In this there are
some nation that are not able to protect national cyber security in spite of updating their IT
infrastructure. Alongside, cyber war occurs in both political and military way. National threats
acquire major part in cyber space.
Information environment discussion – it is an environment where a lot of information exists
and stored in database. Also, where user interact with others and share data and info. It consists
of many things such as system, technology, etc. basically, cyber security is included in it. there
are several components to information environment that fits into cyber space. Social network and
info war fare is part of it. For example – army uses this to analyse officer position and involve
attacking, defending and finding out vulnerability in cyber network. Along with it, functional
3
Cyber Operations: Fog of War, Information Environment, and Decision Making_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cyber Security and Decision Making
|6
|1259
|99