7COM1069 Cyber Operations: Fog of War, Info Environment & Decisions

Verified

Added on  2023/01/17

|6
|1243
|39
Report
AI Summary
This report examines key aspects of cyber operations, including the 'fog of war' in cyberspace, the information environment, and decision-making processes. It highlights the increasing complexity of maintaining cybersecurity at national and international levels due to cyber thefts and warfare, particularly involving countries like Russia and China. The report discusses the role of black hat hackers and the challenges in protecting national cybersecurity. It also delves into the information environment, its components like social networks and information warfare, and how the US Army is developing cyber doctrines. Furthermore, the report emphasizes the importance of effective decision-making in cybersecurity to mitigate risks and the need for strategic frameworks to address global and national cyber issues. The report concludes by advocating for government strategic domains to ensure proper decisions and maintain data integrity and confidentiality.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
7COM1069 : Cyber
Operations
1
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Table of Contents
INTRODUCTION...........................................................................................................................3
REFERENCES................................................................................................................................6
2
Document Page
INTRODUCTION
Cyber security has become a major issue in recent times. Many countries are facing a big
problem as they are not able to maintain security of data. The area of cyber space has increased
and several other components are involved in it. So, it is improving the capabilities of cyber war
fare. Through it, they are able to breach data and info. In addition, nations are trying to engage
into political and military war in cyber space (Berger, 2017). Now a days, telecommunication
and satellite is highly useful component. Black hat hackers are specialist in hacking of data in
cyber space. Cyber operations are those that are conducted within cyber space. It contain transfer
of data, developing policies, using computer systems, etc.
This report will discuss about different topics that are fog of war, information
environment and decision making in cyber.
Fog of war in cyber space – it refers to that how at national and international level the cyber
thefts are happening. In present technological world, it has become complex to maintain cyber
security and crucial information. It has resulted in cyber war as hackers are hacking data of
nation. Here, the main countries that are having cyber warfare capabilities are Russia and China.
In cyber space there are many black hat hackers available. They play major role in hacking data
for financial gain. Black differ from white because they are security specialist who find out
methods to reach security. Generally, hackers breach into national cyber security database. It
enables to break protocols and exploit data. For of war in cyber space has increased to a great
extent. Now, many countries are engaged into this to obtain data and info. Russia and China try
to steal data of other countries (Betz, 2017). thus, area of cyber space is growing at rapid rate.
So, each nation is trying to engage in this more, it has led to war between them. In this there are
some nation that are not able to protect national cyber security in spite of updating their IT
infrastructure. Alongside, cyber war occurs in both political and military way. National threats
acquire major part in cyber space.
Information environment discussion – it is an environment where a lot of information exists
and stored in database. Also, where user interact with others and share data and info. It consists
of many things such as system, technology, etc. basically, cyber security is included in it. there
are several components to information environment that fits into cyber space. Social network and
info war fare is part of it. For example – army uses this to analyse officer position and involve
attacking, defending and finding out vulnerability in cyber network. Along with it, functional
3
Document Page
areas include EW, EMSO, CNO, etc. information operations integrate in it that is shaped by use
of domain to modify data. At present US army is developing cyber doctrine today. They are
working on concept of cyber war fare and framework to conduct cyber operations within time
frame (Briskin and et.al., 2016)
CO is global frame work that contain network of IT, infrastructure, data, internet, etc. the
main purpose of CO is to support in decision making. Its implementation has resulted in
improving capabilities within cyber space. However, IRC across in multiple lines in decision.
Decision making for cyber – In order to maintain cyber security, it is necessary to take effective
decision. This enables in successfully identifying risk and reducing impact of cyber attack.
Along with it, strategies are required to establish a frame work on make a decision. Nations and
cyber experts must optimise things related to security. It enables in taking security measures.
However, there occurs various friction issues in cyber space. It ensures that stability paradox
constraints of cyber interaction in maintaining relationship. The issues are at global, national or
individual level. so, government is required to develop strategic domain that consists of
interdependent of network including internet, data, computer systems, etc. through this, it will be
easy to take appropriate decisions.
Critical discussion
It can be analysed that cyber crimes has raised rapidly in recent times. This has led to war
in between developed nations within cyber space to steal and hack data. However, dominance of
cyber space has resulted in war (Crowther, 2017). Government is supporting black hat hackers
to breach national cyber security. Moreover, it is justified that cyber war fare capabilities have
increased to allow countries to engage in cyber security.
The information environment is combination of many components that are internet,
system, data, etc. it covers other areas as well like cyber information, modification, etc. here, info
security is a practice followed to mitigate risk. through it, unauthorised access, prevention, use,
etc. of data is protected and reducing impact on incidents. This is done by both tangible and
intangible way. beside this, main aim is to maintain integrity and confidentiality of data. For this,
policy is formed and implemented. For instance, US have formed a policy for it.
Along with it, developing policy will result in providing a frame work through which
decision are taken. with this, it will be easy to conduct a risk management process and
determining potential threat and vulnerabilities. Apart from it, by working as per strategic
4
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
domain of government, national cyber security will focus on ensuring that proper decisions are
taken and implemented (Ottis, 2015). Furthermore, the friction issues will be reduced and it will
lead to maintaining integrity and confidentiality of data. With help of strategic domain global
and national issues of cyber security will be solved. The countries will be able to maintain their
national cyber security.
5
Document Page
REFERENCES
Books and journals
Berger, A.M., 2017. The End of the War as We Know It: How an Act of Cyber Warfare Could
Impact the US Energy Grid. J. Tech. L. & Pol'y, 22, p.141.
Betz, D.J., 2017. Cyberspace and the State: Towards a Strategy for Cyber-power. Routledge.
Briskin, G., and et.al., 2016. Design considerations for building cyber deception systems.
In Cyber Deception (pp. 69-95). Springer, Cham.
Crowther, A., 2017. National Defense and the Cyber Domain. Retrieved from The.
Ottis, R., 2015. Cyber Warfare. In Cyber Security: Analytics, Technology and Automation (pp.
89-96). Springer, Cham.
6
chevron_up_icon
1 out of 6
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]