Cyber Operations: Principles, Offensive and Defensive Operations
Verified
Added on  2023/01/18
|15
|3196
|38
AI Summary
This report discusses the principles of cyber maneuver, offensive and defensive operations in modern information systems. It also explores the use of Wireshark for packet analysis and computer security principles.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
CYBER OPERATIONS
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Table of Contents INTRODUCTION...........................................................................................................................3 TASK 2............................................................................................................................................3 Paper critique..........................................................................................................................3 Explain the cyber maneuver principles and the offensive and defensive operations.............4 Cyber operations in the modern environment........................................................................6 TASK 3............................................................................................................................................7 Understand principles in computer security from system perspectives.................................7 Packet analysis........................................................................................................................7 CONCLUSION..............................................................................................................................14 REFERENCES..............................................................................................................................15
INTRODUCTION Cyber operations are based on the activities that performed within network system which mainly focused on the assuring critical department of defence mission. It is delivered the solution which enable intelligence and business operations. It also implemented cyberwarfare technology that mainly attack nation and also causes the comparable harm to actual warfare. This report is based on the Wireshark tool that used as an open source packet analyser. It applicable for trouble shooting, software and communication protocol and analysis.Network administrator is mainly usedforexamineoverallsecurityproblems,troubleshootnetworkissuesandidentifying applications. This report will discuss about the Cyber manoeuvre in terms of modern information environment that critically analyse about the principles which underpin defensive and offensive operation in modern information system. Furthermore, it will discuss about the understanding of advance principles in terms of compute security perspectives. TASK 2 Paper critique Deception and Maneuver Warfare Utilizing Cloud Resources Through the paper critique we have analysed that the deception and the Maneuver warfare had utilize the cloud resources. It is using the cloud computing resources and the SME are operating it on the national and multinational level. Proactive operations are used by the securing the digital assets and the including the deception strategy as well. On the other context we think that the deception Maneuver warfare are utilized the cloud resources. These are using the investment at the time of the Maneuver warfare and also it requires the power and storage as well. All the knowledge is readily available but the information provided could be stolen by anyone. It requires the high-tech security for securing the information.
Explain the cyber maneuver principles and the offensive and defensive operations The cyber operations include the computer programs and the ways which create the effect on the cyber space. Cyber maneuver is the concept used in wars for destroying the enemy. The process in which the employees move towards the enemy and also include the military support to achieve the objective. The cyber maneuver consists of the speed which runs at the speed of the machine and also speed responses to the human speed of the decision-making. In these processes the military would reach the enemy without any loss. Due to emerging of the new technologies and legal factors the cyber operations are running effectively. Operation in the cyber space is the is depends upon the technology and the technical capabilities of the country. Traditional maneuver warfare consists of the military forces which would also include the situation of the war at the at time. Cyber maneuver principles cyber space maneuver is cyber operation which are organized for fight in growth the enemy at the time of the war and also the to protect the information which is stored in the computers. It includes the cyber space domain which is globally connecting all the computer networks. The electromagnet spectrum is used for storing the information and also transmit and modify the data of the networks as well. Cyber space actions are running at the speed of the machine and target would be set for different attackers (Shan, Neamtiu, Qian and Torrier 2015). Traditional maneuver involves the movement of the military forces and the also it would support the fires in the war fighting situations. Due to the lack of the forces the maneuver war fare would use the cyber security and cyber space maneuver for attacking and defensing at the time of the war. Military forces consist of the computers and the software and the operations which would run on the computers. At the time of the war the cyber operation are run according to the conditions the attack would be offensive or defensive. Offensive operation offensive cyber space maneuver operations are done to obtain the denial, disruption and destruction of the target thorough the help of the cyber space operations (Steiner 2017). These offensive techniques are categorized on the basis of the exploitive, positional and categorized as well. Offensive cyber maneuver is divided into the three parts and are described below:
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Exploitive maneuver Through the use of the exploitive maneuver the military would capture the information of the enemy and also gain the strategies of the enemies and as well. The information captured is used against the enemy at the time of the war. Key information is used by the military and the report are made for destroying the enemy. Positional maneuver In the positional maneuver the military would be using the physical nodes of the information to follow the operations of the enemy. In order to control the enemy the cyber operation would be arranged and the computers would capture all the logical nodes of the enemy which would help us to follow the enemy and the strategies as well (Schmitt 2017). Influencing maneuver The cyber operation is used by the military for the taking any decisions about the enemy at the time of the war. In the influencing power the enemy is influenced by the actions and also the enemy would forcefully approve the decisions of the military or in the indirect way. Kinetic maneuver operations are producing the similar effects which are giving the effect on the cyber space, and they do not have the analog signal as well. For example- if the enemy has distributed the denial attacks and it would raise the problem because of the no analog signals. The military is using the cyber security at the time of the war for protecting our data and also to track the enemy at every step. Due to tracking the military would track the strategies of the enemy. Defensive operations The defensive cyber maneuver includes the cyber space action which are done in the traditional manner and it would also build the secure network. The defensive operation is also categorized in Perimeter defense In order to control the enemy the cyber maneuver is used and it would also create the hard and the defensive to protect the interior systems in which the information is stored (Gioe 2016). The interior systems consist of the strategies and the information so these must have the hard and strong interior systems which cannot be controlled by anyone. The information protector must be offensive maneuver which would be protecting the information.
Deceptive defense Deceptive defense is used by the attacker and also action of them would assist the attacker to find the strategies and methods. It would also assist the defender to gain the initiative and also the waste resources. Moving target defense In order to keep an eye on the enemy the target are moved easily in the defensive cyber maneuver (Brantly, 2017). Cyber operations would include the technical methods for shifting the targets systems. Through the help of these the manure the attacker is finds hard to trace the target. The method is quote complex and also the attacker would find the problem. Moving the target is only method which is quite similar to the traditional methods of the cyber space maneuver. Due to use of the technology in the cyber operation the defensive techniques has also been improved with the time and the technology. Cyber operations in the modern environment In the modern era the cyber operations are the part of the information warfare operations and the information is controlled form the information environment. Cyber operations include the mission area and the cyber operations include the defense mission and the cyber warfare operations as well. It includes the intelligence and military operations and also cyber space operations as well. Cyber warfare operations are the part of the cyber operations. In the offensive or the defensive maneuver the cyber space would mark the target to attack. In the modern era the cyberoperationsarehandledthroughtheelectronicmediaandthecomputerssystems. Traditional methods of the maneuver include the target, facilities, equipment and the companies which are supporting the conditions or would help in the situation. The military forces attack and defend themselves form the attackers but in the cyber space operations the server farm is destroyed and the and data in computers an or the soft wares is manipulated accordingly. Power projects platforms and the weapons which would be used in the war are no physical assets, in the cyber operation the capabilities and the technology is tested which would be protecting the information of the customers.
TASK 3 Understand principles in computer security from system perspectives. Computer security is based on the process for maintaining protection which are affordable to automated information system. in order to understand persevering objective that maintain confidentiality, integrity and availability of data system resources (Bagyalakshmi and et.al., 2018). There are common principles applicable in computer security from perspective for overall network system. At the time of data transmission from source to destination which requires proper security aspects for reducing risk of attack and threat within network. ď‚·It will be used the Discretionary access control procedures, which based on the determine requestor and also access rules for stating different requestors. They must allow to protect resources that used in the network protection. ď‚·It also set up the rules and practices which may specify proper regulation where how overall system or business provide security services of their network system. in this way, it can easily protect sensitive information and system resources in proper manner. ď‚·A protection due to violation in terms of security, it exits when there are some different circumstances, action, capability and event that could occurs data breach. In this way, it is becoming possible to hold all security concept in term of privacy and security. Packet analysis Wireshark is based on the network analysis platform or tool which easily captured packet in real time and also display them of readable format for human being (Jawaharan, Mohan and Gurusamy, 2018). This type of tool is mainly including colour coding, filters and other type of features that can identify the depth network traffic. It is best process for inspection of individual packets.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Figure1 In the screenshot, installing the wireshark it can be launched it and click the name of particular network interface which captured to start running capture various network.it is representing Home page of Wireshark that must be selecting the Internet connection and also configure the advanced features by capturing.
Figure2 If the packets start to appear in the real time where wireshark captured each and every packet that send to the system. It enabled by deafult and check overall packets on the network system. it only addressed to network adapter. It will check the promiscuous mode that has enabled and verify the mode on all interfaces. 183. 126.896083: It can be sending data or information form source side (146.90.197.173) and receive on destination side (192.168.1.200) . it shows black colors that’s means where generating
errors during data transmission and cannot be received in accurate destination. In this way, it can be concluded that it could have been delivered out of order. On the other hand, it also representing the red colour which means that generate threat due to attack in network system. 186.127.08644 :It has to be sending data from source to destination so as determine in network packet analysis. Source is (192.168.1.200) and destination is (146.90.197.173). it mainly uses for identifying the overall errors during data transmission. It has a chances of data losswithin network system. Color coding: After analysing, it can be found that there are large number of data packet transferred within one network. it also highlighted in the different color format. Wireshark is mainly used the color that help for identidying traffic type (Bock, 2019). By defualt the Purple color is represents TCP traffic and blue color shows UBP traffic. On the other hand, black idetifies packet with errors. ď‚·Red color:It is mainly representing threat of network system during data transmission from source to destination. ď‚·Dark blue color:it is mainly representing the DNS traffic. If it will show that colors means data traffic increases in siganl tranmission. ď‚·Lighcolor: it is representing the UDP traffic where becoming tought for managing traffic devel of UDP in data traffic within network system. ď‚·Black Color:it can be represented as an error in the data tranmission where singals has not be reached to their destination (Bhandari and et.al., 2018).
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Attack explanation Wireshark software is mainly captured the network traffic and also displayed colour coded chart as per traffic. It also making it become convenient for administrator to easily identify or detect network attacks. If there will be used to determine hacking attempts on the network system. there will be examining the colour coded result or outcomes (Holkovič, Ryšavý and Dudek, 2019). As per capture analysis, Red color shows that must indicate the required for immediate attention otherwise it will generate threat to network system. it also investigates about the potential threat of system by using Wireshark tool. In above Figure-2, it can be identified that red color shows because of threat and sometimes, it may indicate Denial of service attacks and other hacking activities occurred. DoS attacks are the most problematic situation because its servers from IP addresses, causes of overall server performance which directly hits entire server. It will get chances of crashes. Statistical analysis Figure3
In this graph, it mainly shows sequence number graph where packet will receive from sources and increasing sequence number but cannot reached to the actual destination. At initial level, the sequence number remain constant from time interval 0.0105 and after it will increase size of number. This process will continue running but not reached to their destination. Sequence Number: 146.90.197.173.52895 -> 192.168.1.200:80 Figure4 As per analysis, it can be understanding that window scaling where it will not show an appropriate time and window size because during transmission, it automatically generates error message. As above figure, it can be determined that window size and time are becoming zero.
Figure5 In figure-5, it is mainly representing throughput graph where it become constant due to represent error in the network data transmission from source to destination. It must be consisting of equal time interval of each segments. It can be calculated through Wireshark tool which providing the accurate result or outcome. Activity Narrative and attack identification By using Wireshark, it would be identification of attack in the particular TCP data transmission. Through sophisticated use of technique which takes out of investigation in security application and enabled to mitigate or response to real security threat during data transmission from source to destination. The Activity narrative has performed the different operations within network system where how it will generate threat or error because of attackers. It directly effects on the data transmission from source to destination (Udaya, kumar and et.al., 2018).
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
CONCLUSION In above discussion, it concluded that Cyber operation is a type of process that can perform activities within network system which mainly focused on the assuring critical department of defencemission.Ithassummarisedaboutthecyberwarfaretechnologywhichmainly implemented in the overall system and find out causes by using comparable harm to actual warfare. It can be analysed about the Cyber manoeuvre in terms of modern information environment that critically analyse about the principles which underpin defensive and offensive operation in modern information system. Furthermore, it is also building a strong understanding towards the advanced principles in terms of compute security perspectives.
REFERENCES Books and journals Bagyalakshmi,G.andet.al.,2018.Networkvulnerabilityanalysisonbrainsignal/image databases using Nmap and Wireshark tools.IEEE Access.6. pp.57144-57151. Bhandari, A. and et.al., 2018. Packet Sniffing and Network Traffic Analysis Using TCP—A New Approach. InAdvances in Electronics, Communication and Computing(pp. 273- 280). Springer, Singapore. Bock, L., 2019.Learn Wireshark: Confidently navigate the Wireshark interface and solve real- world networking problems. Packt Publishing Ltd. Brantly, A.F., 2017. Strategic cyber maneuver. Gioe, D.V., 2016. Can the Concept of Maneuver Warfare be Usefully Applied in Cyber Operations?.The Cyber Defense Review. Holkovič, M., Ryšavý, O. and Dudek, J., 2019, September. Automating Network Security AnalysisatPacket-levelbyusingRule-basedEngine.InProceedingsofthe6th Conference on the Engineering of Computer Based Systems(p. 14). ACM. Jawaharan, R., Mohan, P.M. and Gurusamy, M., 2018, July. Empirical Evaluation of SDN ControllersUsingMininet/WiresharkandComparisonwithCbench.In201827th International Conference on Computer Communication and Networks (ICCCN)(pp. 1-2). IEEE. Schmitt, M.N. ed., 2017.Tallinn manual 2.0 on the international law applicable to cyber operations. Cambridge University Press. Shan, Z., Neamtiu, I., Qian, Z. and Torrieri, D., 2015, October. Proactive restart as cyber maneuver for Android. InMILCOM 2015-2015 IEEE Military Communications Conference(pp. 19-24). IEEE. Udayakumar, N. and et.al., 2018, April. Bandwidth Analysis of File Transfer Protocol. In2018 International Conference on Communication and Signal Processing (ICCSP)(pp. 0791- 0795). IEEE. Steiner, H., 2017. Cyber operations, legal rules and state practice: authority and control in international humanitarian law.