Topics

Conclusions and Summary

In today's interconnected world cyber operations impacts everyone directly or indirectly. Achieving and maintaining superiority in cyber operations is a stated national strategy and a core part of the NSA/CSS and Cyber Command missions.

Cyber operations encompasses more than information assurance, since it involves the full scope of cyber activities on a global scope within an integrated strategy.

Cyber operations comprise both defensive operations including Computer Network Defense (CND), and offensive operations that include Computer Network Exploitation (CNE), and Computer Network Attack (CNA) against an adversary to achieve national objectives.

This tutorial provided an overview of cyberspace and the threats to national interests, an introduction to concepts involved In cyber operations, including strategies, functional taxonomies, metrics, and assessment.

Assessment

Relevance

Cyber Operations impacts everyone directly or indirectly since we all share a common information infrastructure that is global in extent and pervasive into every aspect of our lives. Additionally, achieving and maintaining superiority in cyber operations is a stated national strategy and a core part of the NSA/CSS and Cyber Command missions.

The strengths, weaknesses, opportunities, and threats that apply to cyber operations are summarized as follows.

Strengths Defensive cyber operations provide us with the ability to protect the confidentiality of sensitive information, and the integrity and availability of our critical information infrastructures.
Offensive cyber operations are an important contributor to national intelligence with the capability to fulfill critical information needs.
Offensive cyber operations are an important component of our national deterrence strategy.
Weaknesses The technologies and topology of the Internet are always in a state of change, complicating both the technical and operational factors affecting cyber operations.
The scale of the Internet challenges cyber capabilities.
The vulnerabilities inherent to commercial IT provide an unsolvable cyber security challenge.
Opportunities The world's information resources of the world are increasingly accessible for cyber operations.
Threat Cyber operations involves asymmetrical capabilities. Even a poorly resourced adversary can pose a significant threat to more resourced targets within the U.S.

Continue to Cyber Security Links.