Cybersecurity & Electronic Warfare 1

it is from CYB33 course (Cyber Security & Electronic Warfare) - KSU - Lec1

Jetzt loslegen. Gratis!
oder registrieren mit Ihrer E-Mail-Adresse
Cybersecurity & Electronic Warfare 1 von Mind Map: Cybersecurity & Electronic Warfare 1

1. Information:

1.1. means

1.1.1. Data

1.1.2. Software

1.1.3. Hardware

1.1.4. People

1.2. Information Security:

1.2.1. Information System: Collection, processing, maintenance, use, sharing, dissemination, or disposition of information

1.2.2. Protection of information and information systems from:

1.2.2.1. Unauthorized access

1.2.2.2. Unauthorized modification

1.2.2.3. Denial of service

1.2.3. CIA (Confidentiality, Integrity, Availability)

1.3. Information Warfare:

1.3.1. Cyberwar: Conducting and preparing military operations according to information-related principles, disrupting or destroying information and communications systems

1.3.2. Netwar: Information-related conflict at a grand level between nations or societies, trying to disrupt, damage, or modify what a target population knows or thinks it knows

1.4. Information Warfare Technical Operations:

1.4.1. nform and influence operations

1.4.2. Signals intelligence

1.4.3. Electronic Warfare

1.4.4. Spectrum management

1.4.5. Cyber Operations

1.5. Social Media as a Weapon:

1.5.1. Info-gathering: Gathering information passively from open sources

1.5.2. Offense: Conducting offensive social media operations to deliver cyber effects and counter adversary operations

1.5.3. Defense: Counter-messaging to mitigate adversary's offensive social media operations

2. Cyberspace:

2.1. means

2.1.1. Interdependent networks of IT infrastructure

2.1.2. Internet, telecommunications, computer systems

2.1.3. Embedded processors and controllers

2.1.4. Characteristics:

2.1.4.1. Speed

2.1.4.2. Participation

2.1.4.3. Anonymity

2.1.4.4. Growth and dynamism

2.1.4.5. Digitization

2.1.4.6. Miniaturization

2.1.4.7. Mobility

2.1.4.8. Efficiency

2.2. Cyberspace Operations:

2.2.1. U.S. DoD: "Employment of cyberspace capabilities to achieve objectives in or through cyberspace"

2.2.2. U.K. MoD: "Planning and synchronization of activities in and through cyberspace to enable freedom of maneuver and achieve military objectives"

3. Cybersecurity:

3.1. means

3.1.1. Protecting and defending cyberspace against attacks

3.1.2. Prevention of damage to, protection of, and restoration of computer systems, electronic communication, etc.

3.2. Pillars of Cybersecurity:

3.2.1. Confidentiality Integrity Availability Non-repudiation Authentication Authorization Accountability

3.2.1.1. Identity, Authenticity, and Authorization:

3.2.1.1.1. dentification: "Who are you?"

3.2.1.1.2. Authentication: "Can you prove it?"

3.2.1.1.3. Authorization: "What are you allowed to do?"

3.2.2. Enabling the Properties and Avenues of Compromise:

3.2.2.1. (Sub-branches based on specific vulnerabilities and attack methods)

4. Electronic Warfare (EW):

4.1. means

4.1.1. -Military action involving the use of electromagnetic and directed energy to control the electromagnetic spectrum or attack the enemy.

4.1.2. -Electromagnetic spectrum: Range of frequencies of electromagnetic radiation from zero to infinity.

4.2. Electronic Warfare Operations:

4.2.1. Electronic attack: Offensive use of electromagnetic energy to attack personnel, facilities, or equipment

4.2.2. Electronic protect: Defensive actions to protect personnel, facilities, or equipment from electronic attack

4.2.3. Electronic support: Intercepting, identifying, and locating sources of radiated electromagnetic energy

4.3. Spectrum Management Operation:

4.3.1. Planning, coordinating, and managing use of the electromagnetic spectrum to enable military electronic systems to perform their functions

4.3.2. Spectrum operations, cyber operations, and EW operate in and through the electromagnetic environment

4.4. Distinguishing Cyber and EW from Traditional Kinetic Attacks:

4.4.1. Kinetic attack: Destruction of a target by application of physical force

4.4.2. Electronic attack: Destruction by application of focused energy directed at a target

4.4.3. Cyber attack: Destruction by an electronic message or software code applied to controlling computers or software

5. Cyberoperations:

5.1. (Sub-branches based on specific types of cyber operations)

6. Security Terms:

6.1. Flaws

6.2. Vulnerabilities

6.3. Exploits