jp3_12r
jp3_12r
jp3_12r
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Chapter I<br />
They should develop mitigation and recovery measures, defensive cyberspace operations<br />
(DCO) priorities, primary/secondary/tertiary communication means, and measures to ensure<br />
critical data reliability. When the staff perceives that they cannot trust data on a network, or<br />
segment of the network, they should stop using the network/segment. In fact, the perception<br />
of data unreliability may unnecessarily extend beyond the specific degraded segment.<br />
Therefore, it is imperative that the staff be informed of network/segment status as quickly as<br />
possible.<br />
2. Cyberspace<br />
a. Cyberspace, while a global domain within the information environment, is one of five<br />
interdependent domains, the others being the physical domains of air, land, maritime, and<br />
space. Much as air operations rely on air bases or ships in the land and maritime domains,<br />
CO rely on an interdependent network of IT infrastructures, including the Internet,<br />
telecommunications networks, computer systems, and embedded processors and controllers,<br />
and the content that flows across and through these components. CO rely on links and nodes<br />
that reside in the physical domains and perform functions experienced both in cyberspace<br />
and the physical domains. For example, network servers may reside in a land-based data<br />
complex or at sea aboard warships, and wireless network transmissions pass through air and<br />
space and even underwater. Similarly, activities in cyberspace can enable freedom of action<br />
for activities in the physical domains. Activities in the physical domains can create effects in<br />
and through cyberspace by affecting the electromagnetic spectrum (EMS), or the physical<br />
infrastructure. The relationship between space and cyberspace is unique in that virtually all<br />
space operations depend on cyberspace, and a critical portion of cyberspace can only be<br />
provided via space operations. Space provides a key global connectivity option for CO.<br />
Conversely, CO provide a means by which space support is executed. These interrelationships<br />
are important considerations across the spectrum of CO, and particularly when<br />
conducting targeting in cyberspace (see Chapter IV, “Planning and Coordination”).<br />
b. Cyberspace consists of many different and often overlapping networks, as well as the<br />
nodes (any device or logical location with an internet protocol [IP] address or other<br />
analogous identifier) on those networks, and the system data (such as routing tables) that<br />
support them. Though not all nodes and networks are globally connected or accessible,<br />
cyberspace continues to become increasingly interconnected. Networks can be intentionally<br />
isolated or subdivided into enclaves using access controls, encryption, disparate protocols, or<br />
physical separation. With the exception of physical separation, none of these approaches<br />
eliminate underlying physical connectivity; instead they limit access. Achieving CO access<br />
may be affected by legal, sovereignty, policy, informational environment, or operational<br />
limitations; however, adjusting to limitations does not necessarily allow access to a target.<br />
c. Cyberspace can be described in terms of three layers: physical network, logical<br />
network, and cyber-persona (Figure I-1). Each of these represents a level on which CO may<br />
be conducted.<br />
(1) The physical network layer of cyberspace is comprised of the geographic<br />
component and the physical network components. It is the medium where the data travel.<br />
The geographic component is the location in land, air, sea, or space where elements of the<br />
I-2 JP 3-12