logo

Cyber Operations: Principles, Offensive and Defensive Operations

15 Pages3196 Words38 Views
   

Added on  2023-01-18

About This Document

This report discusses the principles of cyber maneuver, offensive and defensive operations in modern information systems. It also explores the use of Wireshark for packet analysis and computer security principles.

Cyber Operations: Principles, Offensive and Defensive Operations

   Added on 2023-01-18

ShareRelated Documents
CYBER OPERATIONS
Cyber Operations: Principles, Offensive and Defensive Operations_1
Table of Contents
INTRODUCTION...........................................................................................................................3
TASK 2............................................................................................................................................3
Paper critique..........................................................................................................................3
Explain the cyber maneuver principles and the offensive and defensive operations.............4
Cyber operations in the modern environment........................................................................6
TASK 3............................................................................................................................................7
Understand principles in computer security from system perspectives.................................7
Packet analysis........................................................................................................................7
CONCLUSION..............................................................................................................................14
REFERENCES..............................................................................................................................15
Cyber Operations: Principles, Offensive and Defensive Operations_2
INTRODUCTION
Cyber operations are based on the activities that performed within network system which
mainly focused on the assuring critical department of defence mission. It is delivered the solution
which enable intelligence and business operations. It also implemented cyberwarfare technology
that mainly attack nation and also causes the comparable harm to actual warfare. This report is
based on the Wireshark tool that used as an open source packet analyser. It applicable for trouble
shooting, software and communication protocol and analysis. Network administrator is mainly
used for examine overall security problems, troubleshoot network issues and identifying
applications. This report will discuss about the Cyber manoeuvre in terms of modern information
environment that critically analyse about the principles which underpin defensive and offensive
operation in modern information system. Furthermore, it will discuss about the understanding of
advance principles in terms of compute security perspectives.
TASK 2
Paper critique
Deception and Maneuver Warfare Utilizing Cloud Resources
Through the paper critique we have analysed that the deception and the Maneuver
warfare had utilize the cloud resources. It is using the cloud computing resources and the SME
are operating it on the national and multinational level. Proactive operations are used by the
securing the digital assets and the including the deception strategy as well. On the other context
we think that the deception Maneuver warfare are utilized the cloud resources. These are using
the investment at the time of the Maneuver warfare and also it requires the power and storage as
well. All the knowledge is readily available but the information provided could be stolen by
anyone. It requires the high-tech security for securing the information.
Cyber Operations: Principles, Offensive and Defensive Operations_3
Explain the cyber maneuver principles and the offensive and defensive operations
The cyber operations include the computer programs and the ways which create the effect
on the cyber space. Cyber maneuver is the concept used in wars for destroying the enemy. The
process in which the employees move towards the enemy and also include the military support to
achieve the objective. The cyber maneuver consists of the speed which runs at the speed of the
machine and also speed responses to the human speed of the decision-making. In these processes
the military would reach the enemy without any loss. Due to emerging of the new technologies
and legal factors the cyber operations are running effectively. Operation in the cyber space is the
is depends upon the technology and the technical capabilities of the country. Traditional
maneuver warfare consists of the military forces which would also include the situation of the
war at the at time.
Cyber maneuver principles
cyber space maneuver is cyber operation which are organized for fight in growth the
enemy at the time of the war and also the to protect the information which is stored in the
computers. It includes the cyber space domain which is globally connecting all the computer
networks. The electromagnet spectrum is used for storing the information and also transmit and
modify the data of the networks as well. Cyber space actions are running at the speed of the
machine and target would be set for different attackers (Shan, Neamtiu, Qian and Torrier 2015).
Traditional maneuver involves the movement of the military forces and the also it would
support the fires in the war fighting situations. Due to the lack of the forces the maneuver war
fare would use the cyber security and cyber space maneuver for attacking and defensing at the
time of the war. Military forces consist of the computers and the software and the operations
which would run on the computers. At the time of the war the cyber operation are run according
to the conditions the attack would be offensive or defensive.
Offensive operation
offensive cyber space maneuver operations are done to obtain the denial, disruption and
destruction of the target thorough the help of the cyber space operations (Steiner 2017). These
offensive techniques are categorized on the basis of the exploitive, positional and categorized as
well. Offensive cyber maneuver is divided into the three parts and are described below:
Cyber Operations: Principles, Offensive and Defensive Operations_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Manoeuvre Warfare and Cyber Operations
|7
|1466
|483

Cyber Operations: Critical Analysis of Cyber Manoeuvre Principles
|7
|1437
|378

Cyber Operations: Principles, Analysis, and Security
|15
|2960
|74

Cyber Operation - an overview | Assignment
|26
|4466
|30

Information Security Paper on Cloud Computing
|6
|1514
|84

Cyber Operations Report 2022
|27
|3765
|22