23.10.2014 Views

jp3_12r

jp3_12r

jp3_12r

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter I<br />

They should develop mitigation and recovery measures, defensive cyberspace operations<br />

(DCO) priorities, primary/secondary/tertiary communication means, and measures to ensure<br />

critical data reliability. When the staff perceives that they cannot trust data on a network, or<br />

segment of the network, they should stop using the network/segment. In fact, the perception<br />

of data unreliability may unnecessarily extend beyond the specific degraded segment.<br />

Therefore, it is imperative that the staff be informed of network/segment status as quickly as<br />

possible.<br />

2. Cyberspace<br />

a. Cyberspace, while a global domain within the information environment, is one of five<br />

interdependent domains, the others being the physical domains of air, land, maritime, and<br />

space. Much as air operations rely on air bases or ships in the land and maritime domains,<br />

CO rely on an interdependent network of IT infrastructures, including the Internet,<br />

telecommunications networks, computer systems, and embedded processors and controllers,<br />

and the content that flows across and through these components. CO rely on links and nodes<br />

that reside in the physical domains and perform functions experienced both in cyberspace<br />

and the physical domains. For example, network servers may reside in a land-based data<br />

complex or at sea aboard warships, and wireless network transmissions pass through air and<br />

space and even underwater. Similarly, activities in cyberspace can enable freedom of action<br />

for activities in the physical domains. Activities in the physical domains can create effects in<br />

and through cyberspace by affecting the electromagnetic spectrum (EMS), or the physical<br />

infrastructure. The relationship between space and cyberspace is unique in that virtually all<br />

space operations depend on cyberspace, and a critical portion of cyberspace can only be<br />

provided via space operations. Space provides a key global connectivity option for CO.<br />

Conversely, CO provide a means by which space support is executed. These interrelationships<br />

are important considerations across the spectrum of CO, and particularly when<br />

conducting targeting in cyberspace (see Chapter IV, “Planning and Coordination”).<br />

b. Cyberspace consists of many different and often overlapping networks, as well as the<br />

nodes (any device or logical location with an internet protocol [IP] address or other<br />

analogous identifier) on those networks, and the system data (such as routing tables) that<br />

support them. Though not all nodes and networks are globally connected or accessible,<br />

cyberspace continues to become increasingly interconnected. Networks can be intentionally<br />

isolated or subdivided into enclaves using access controls, encryption, disparate protocols, or<br />

physical separation. With the exception of physical separation, none of these approaches<br />

eliminate underlying physical connectivity; instead they limit access. Achieving CO access<br />

may be affected by legal, sovereignty, policy, informational environment, or operational<br />

limitations; however, adjusting to limitations does not necessarily allow access to a target.<br />

c. Cyberspace can be described in terms of three layers: physical network, logical<br />

network, and cyber-persona (Figure I-1). Each of these represents a level on which CO may<br />

be conducted.<br />

(1) The physical network layer of cyberspace is comprised of the geographic<br />

component and the physical network components. It is the medium where the data travel.<br />

The geographic component is the location in land, air, sea, or space where elements of the<br />

I-2 JP 3-12

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!