“The physical and logical space in which virtual processes exist which influence physical activity, physical life, and logic interactions.”
In the emerging cyberspace, it is possible to see a range of current and developing enterprises characterized by new effort, which may be compared to military conceptualization of the “emerging battlefield”, in which it is necessary to cope with diverse cyber attacks of varying strength that can upset the enemy’s functional equilibrium.
As such, cyberspace brings good news to humanity, but its very dependence on the human factor embodies substantial built-in vulnerability, both in error, but especially through malicious behavior. It can therefore be concluded that the “force multiplier” in cyber technology is liable to turn, if wrongly used, into a “damage multiplier”.
The cyber effort basically comprises three overlapping dimensions/interfaces:
Data protection and support technologies – including integrated actions to prevent harm to data completeness and reliability, and protecting the availability of support technologies’ capabilities and immunity of support systems
Intelligence gathering – listening and gathering information about the opponent’s systems for inquiry, counterintelligence, and intelligence investigation of the information
Intelligence warfare – all operations intended to disrupt, up to the point of paralyzing, functional continuity through information- and embedded computer systems
- User (machine, application, or process) as an data creator or consumer
- Databases which accumulate data created and processed by the user
- Communications infrastructures and facilities are the foundations on which the applications and data rely
- Applied infrastructures are the “brain” which enables data creation and interactions between the physical factor and the logic device.
- Policies, regulations, and procedures
- Technical intelligence gathering tools
- Command and control means – processes for collection, correlation, and filtering irregularities from the organizational rules
- o Integrativity and connectivity between organizations and IT- and data systems
- Simulation, analysis, and decision support tools
- Ongoing operational/business activation
- Operation and maintenance
- Training and Certifications