logo

Fog of Cyber War

   

Added on  2022-09-12

7 Pages1493 Words11 Views
Running head: CYBER OPERATIONS
CYBER OPERATIONS
Name of the Student:
Name of the University:
Author Note:

CYBER OPERATIONS1
Table of Contents
Introduction................................................................................................................................2
Fog of Cyber War.......................................................................................................................2
Information Environment...........................................................................................................3
Decision Making of Cyber.........................................................................................................4
Conclusion..................................................................................................................................5
References..................................................................................................................................6

CYBER OPERATIONS2
Introduction
Information warfare is subfield of larger field for information operations. Information
warfare is more limited concept, this refers to the information operations that are conducted
during time of conflict or crisis intended in affecting certain results against particular
opponent. It includes psychological operations, operations security, electronic warfare,
operations of computer network and military deception (Greathouse 2014). As for
information’s role in war, information operation is recognized as warfare’s distinct form
meeting own individual doctrine, tactics and policy.
Fog of Cyber War
Cyber war is evaluated into two concepts: war and cyberspace that are themselves
equivocal and undefined. This takes a non-linear complex system and then layers on other
non-linear complex system. As result, the concept of war’s state is not clear. Cyberspace is
termed as use of electromagnetic and electronics spectrum. This is employed for creating,
storing, modifying, exchanging and exploiting information through interconnected
information communication (ICT) systems and associated infrastructures (Betz and Stevens
2013). Cyberspace is much more complicated environment having several different systems
within it. All the systems within cyberspace could be interconnected through some way. That
interconnection could be synchronous and permanent along with asynchronous and
intermittent. Even with absence of digital bridges which allow access to specific system,
isolation could beaten by those who are willing in penetrating perimeters of physical security
or by rogue components’ insertion. However efforts for penetrating air-gapped systems could
be costly.
Offensive actions within cyberspace aim in exploiting vulnerabilities and flaws of
systems for interfering with ability of the victims for carrying out military tasks. Defensive

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cyber Operations: Fog of War, Information Environment, and Decision Making
|6
|1243
|39

Cyber Operations: Critical Analysis of Cyber Manoeuvre Principles
|7
|1437
|378