logo

Cyber Operation - an overview | Assignment

   

Added on  2022-09-08

26 Pages4466 Words30 Views
Running head: CYBER OPERATIONS
CYBER OPERATIONS
Name of the Student
Name of the University
Author Note

CYBER OPERATIONS 1
Abstract
In the contemporary world, the entire system of information is based on the technology. The
information is gathered, processed and optimized such that it can be used for the process of
the decision making. This information has to be protected such that the integrity of the data is
maintained. The ‘fog of war’ is one such method which is used for the determination of the
ambiguity of the data which can cause issues in the decision making. The report discusses
about the importance of the Information environment and reasons which can cause issues in
the process of decision making. It also gives an insight regarding the measures which can
mitigate the issues regarding the decision making. There will be a review of the article
“Deception and Manoeuvre Warfare utilising Cloud Resources” in the task 2 and lastly there
will be Wireshark file analysis included in the task 3.

CYBER OPERATIONS 2
Table of Contents
Task 1.........................................................................................................................................4
Introduction:...............................................................................................................................4
Fog of War:................................................................................................................................4
Information Environment:..........................................................................................................5
Critical Discussion:....................................................................................................................5
Decision Making In Cyber Security:......................................................................................5
Mitigation of the Issues Identified:........................................................................................6
Task 2:........................................................................................................................................8
Critique:......................................................................................................................................8
Principles of Maneuver warfare:................................................................................................9
Defensive strategies:..................................................................................................................9
Offensive strategies:.................................................................................................................10
Deception strategy:...................................................................................................................10
Task 3.......................................................................................................................................12
Wireshark:................................................................................................................................12
Packet:......................................................................................................................................13
Statistical analysis:...................................................................................................................14
Network boundaries:............................................................................................................14
Active nodes:........................................................................................................................15

CYBER OPERATIONS 3
Types of IP protocols:..............................................................................................................15
DHCP:..................................................................................................................................15
Address resolution protocol:................................................................................................16
DNS:.....................................................................................................................................18
HTTP:...................................................................................................................................19
TCP:.....................................................................................................................................21
Identification of activity:..........................................................................................................22
Attack explanation:..................................................................................................................23
Conclusion:..............................................................................................................................23
References:...............................................................................................................................25

CYBER OPERATIONS 4
Task 1
Introduction:
With the emergence of the digital age, the need for the cyber security has increased as
well. The damage or the loss of the data due to the unauthorized access of the third party or
the intrusion of the hackers can affect the privacy and the integrity of the data. Thus,
protection of the data is the main concern in the contemporary world. The entire concept of
the information system has been updated with the various security measures that are taken in
order to protect the available information over the air. The following report discusses about
the Information system and its importance along with the concept of the cyber security and
the ‘Fog of War’.
Fog of War:
As per Clausewitz, the uncertainty of the data and information system in the
contemporary world is the fog of war. The ambiguity and the chaos in the information system
creates difficulties in the process of the decision making which in turns lead to the severe
consequences in the entire Information system. With the emergence of the digital age, the
flow of the information into the system has increased at an exponential rate (Canabarro and
Borne 2013). This has increased the rate at which the crimes have in the cyber world. It is
very difficult to identify the possible targets in the cyber world which creates a fog in the
cyber war. Recently, one of the technology has been introduced which is known as the fog
computing according to which, the more is the fogginess of the data the more security
insurance can be provided to the system. In this system, a part of the data remains secure
even if some other part of the data has been compromised and this is all due to the
opaqueness of the data due to high fogginess. The fog computing technology ensures security

CYBER OPERATIONS 5
by splitting the bulk data into more subparts such that the opaqueness of the information can
be increased. The sub parts or the sub-division of the data is stored in the end user devices or
some other devices which are not the part of the same device. In this way the security of the
data in the online services as well as the information system can be increased.
Information Environment:
The information environment is the aggregate of the organizations or the individuals
or the system which helps in the collection of the data and dissemination of the information.
The data obtained from the various sources are unstructured and raw. These data are process
by information system for optimization which further helps in decision making of the
organization such that goals for the organization is obtained. For this purpose of information
optimization, certain tools and techniques are required which is known as the information
technology environment. There are three dimension of the information environment and they
are namely, physical dimension, cognitive dimension and informational dimension (McHale
2019). The physical dimension is the place where the overlapping between the physical world
and the information environment takes place. The informational dimension is one of the place
where the information is processed, disseminated and protected for providing an optimized
result. The cognitive dimension is the place where the human can make decisions of the
available information. The information system is the medium via which the information
technology and people interact with one another for the generation of results which benefits
the organization.
Critical Discussion:
Decision Making In Cyber Security:
Uncertainty in the cyber incidents: The cyber system consists of the technology.
The technologies are nothing more than the machines with certain functionalities

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cyber Operations Report 2022
|27
|3765
|22

Cyber Operations: Principles, Offensive and Defensive Operations
|15
|3196
|38

Cyber Operations: Fog of War, Information Environment, and Decision Making
|6
|1243
|39

Fog of Cyber War
|7
|1493
|11

Cyber terrorism Assignment 2022
|2
|570
|28

Manoeuvre Warfare and Cyber Operations
|7
|1466
|483