23.10.2014 Views

jp3_12r

jp3_12r

jp3_12r

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter II<br />

periodic refreshing and retesting to ensure that they are still both secure and capable of<br />

creating the required effects despite changes in the targeted OE.<br />

g. Protection<br />

(1) Protection is somewhat unique within cyberspace because adversaries can<br />

create multiple, cascading effects that may not be restricted by physical geography,<br />

civil/military boundaries, and significantly expand the area requiring protection. Cyberspace<br />

capabilities requiring protection include not only the infrastructure (computers, cables,<br />

antennas, and switching and routing equipment), as well as parts of the EMS (e.g., datalink<br />

frequencies to include satellite downlink, cellular, and wireless), and the content (both data<br />

and applications) on which military operations rely. Key to cyberspace protection is the<br />

positive control of the DODIN and the ability to monitor, detect, and prevent hostile traffic<br />

from entering and exfiltration of information.<br />

(2) Protection of friendly cyberspace uses a combination of defensive capabilities<br />

and OPSEC. Because of the speed of effects in cyberspace, automated technologies for<br />

securing networks, verifying approved network configurations, and discovering network<br />

vulnerabilities often provide a far better chance of success than their manual equivalents.<br />

However, the strongest encryption and most secure protocols cannot protect our networks<br />

from poorly trained/motivated users who do not employ proper security practices.<br />

Commanders should ensure personnel understand and are accountable for their roles in<br />

cybersecurity.<br />

II-12 JP 3-12

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!