logo

Cyber Operations: Principles, Analysis, and Security

   

Added on  2023-01-18

15 Pages2960 Words74 Views
Cyber Operations
Cyber Operations: Principles, Analysis, and Security_1
Table of Contents
INTRODUCTION...........................................................................................................................3
TASK 2............................................................................................................................................3
Principles of Cyber Maneuver................................................................................................3
Cyber Operations in the modern environment.......................................................................4
TASK 3............................................................................................................................................5
Describe about the advanced principles of computer security from the system....................5
Packet Capture analysis..........................................................................................................6
CONCLUSION..............................................................................................................................13
REFERENCES..............................................................................................................................14
Cyber Operations: Principles, Analysis, and Security_2
INTRODUCTION
The Cyber Operations Mission Area is shaping the future of warfare through cyber operations,
focusing on assuring critical Department of Defense missions, delivering key solutions to enable
intelligence and military operations, and developing the systems that underpin novel operational
capabilities in cyberspace and across the electromagnetic spectrum. This documentation will
demonstrate about the packet capture analysis by using Wireshark. It will identify the suitable
security principle and practices that must require to adopt in the data transmission from one place
to another. Furthermore, it will discuss about principle of Cyber Maneuver which will capable
for identifying technical aspects.
TASK 2
Principles of Cyber Maneuver
Maneuver of cyberspace depend on the capabilities of technical aspects in an environment
which is rapidly changing and developing in this industry. The domain of cyberspace gives the
introduction of series with considerations that are distinct and which applies to warfare in
traditional approach which helps to analyze the operations of cyberspace. (Saner and et.al.,
2016.) Actions are occurred according to the speed of the machine and it vary according to the
distance which may be enormous and can be affected or done by many attackers who set a
parallel series of targets. It is impossible to give an attribute to an entity even after discovering
them and even if it is concerned with defending them. Range of operations of cyberspace and
their targets can be reach from a single station to hundreds or thousands of servers which already
stores the information of millions of people. By leveraging the domain any single person can
influence the data in a misappropriate manner with the technology that cannot be discovered
which increases the vulnerability of this sector under a nation, state or corporation. This domain
of cyberspace has some unique aspects which helps in creating a battle space which is
fundamentally different. Also, the considerations which are necessary are branch of this
maneuver theory distinctly. Warfare of this approach is traditional and it involves big decisions
and information such as movement of forces of military which also gives the advantage to the
Cyber Operations: Principles, Analysis, and Security_3
forces of military when the issues are concerned with attack and defense. In this area military
uses this software, hardware, operators in a way which is offensive or defensive in the operation
of cyberspace. The concept of this method is to support the fire which are elements of non-
proximate substances and the movement of the forces does not help it describing it in a accurate
manner which is in relation with the action of these operations linked with cyberspace. Maneuver
forces must have advantage because the reason is the environment gets manipulated with the
help of operations of cyberspace. This approach and method is consists of a series of firewalls on
a network. It is required and enabled so that it can be used to defense the operations of
cyberspace. Operations which are related to cyberspace can be classified in two ways and that is
either the actions done by them can be offensive or defensive. (Power, 2017) It is often seen that
actions which are related to offensive cyberspace are used for the aspects which are concerned
with degradation, denial, destruction or disruption so that the target which is set can be
manipulated with the help of employing cyberspace capabilities. The effects which are the results
of the offensive classification are generally comes under positioning, exploitative or actions
which can be influenced. Actions which are kinetic sometimes they can also be used for the same
actions as offensive. The manner in which these effects are made in this domain are not linked
directly to the approach or method of this theory of Maneuver. On the other hand, actions which
are classified as defensive cyberspace. This classification is extent with a slightly more degree of
operations. It helps in stating the maneuver that secure, rebuild, protect or recover the survey of
networks which are friendly. To accomplish these effects, first step is to categorize the operation
as deceptive defense, perimeter defense or the target that moves the action of defense. Moving
the target even when it is not evolved from single force of this maneuver domain that is also the
least similar to the actions which are traditional. (Lewis, 2015)
Cyber Operations in the modern environment
These types of operations are concerned with defending the attack on the computer and
networks. It also includes real attacks and techniques which are classified as offensive and
defensive. It is supported by resources which are rich in nature. (Steiner, 2017) To enable this
process DNS and directory which is active is required through the services and network which is
common. The whole program involves web servers and database and it ends with a web
application that is complex. By this infrastructure of defensive classification can be made which
includes system which can detect intrusion, application of firewalls, log servers. The concept of
Cyber Operations: Principles, Analysis, and Security_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cyber Operations: Principles, Offensive and Defensive Operations
|15
|3196
|38