jp3_12r
jp3_12r
jp3_12r
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Chapter II<br />
periodic refreshing and retesting to ensure that they are still both secure and capable of<br />
creating the required effects despite changes in the targeted OE.<br />
g. Protection<br />
(1) Protection is somewhat unique within cyberspace because adversaries can<br />
create multiple, cascading effects that may not be restricted by physical geography,<br />
civil/military boundaries, and significantly expand the area requiring protection. Cyberspace<br />
capabilities requiring protection include not only the infrastructure (computers, cables,<br />
antennas, and switching and routing equipment), as well as parts of the EMS (e.g., datalink<br />
frequencies to include satellite downlink, cellular, and wireless), and the content (both data<br />
and applications) on which military operations rely. Key to cyberspace protection is the<br />
positive control of the DODIN and the ability to monitor, detect, and prevent hostile traffic<br />
from entering and exfiltration of information.<br />
(2) Protection of friendly cyberspace uses a combination of defensive capabilities<br />
and OPSEC. Because of the speed of effects in cyberspace, automated technologies for<br />
securing networks, verifying approved network configurations, and discovering network<br />
vulnerabilities often provide a far better chance of success than their manual equivalents.<br />
However, the strongest encryption and most secure protocols cannot protect our networks<br />
from poorly trained/motivated users who do not employ proper security practices.<br />
Commanders should ensure personnel understand and are accountable for their roles in<br />
cybersecurity.<br />
II-12 JP 3-12