53
Cyberspace Operations (CO) 29 July 19 THIS LESSON IS UNCLASSIFIED

Cyberspace Operations (CO) 29 July 19...•Although cyber warfare is currently limited to information networks and network-attached systems, it will drastically expand in the future

  • Upload
    others

  • View
    4

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Cyberspace Operations (CO) 29 July 19...•Although cyber warfare is currently limited to information networks and network-attached systems, it will drastically expand in the future

Cyberspace Operations (CO)

29 July 19

THIS LESSON IS UNCLASSIFIED

Page 2: Cyberspace Operations (CO) 29 July 19...•Although cyber warfare is currently limited to information networks and network-attached systems, it will drastically expand in the future

2UNCLASSIFIED

UNCLASSIFIED

This lesson is

UNCLASSIFIED

Page 3: Cyberspace Operations (CO) 29 July 19...•Although cyber warfare is currently limited to information networks and network-attached systems, it will drastically expand in the future

3UNCLASSIFIED

UNCLASSIFIED

Overview

• Criterion Objective

• Enabling Objectives

• MP1: Introduction to Cyber Operations

• MP2: U.S. approach to Cyber Operations

• MP3: Adversary approach to Cyber Operations

• Summary

Page 4: Cyberspace Operations (CO) 29 July 19...•Although cyber warfare is currently limited to information networks and network-attached systems, it will drastically expand in the future

4UNCLASSIFIED

UNCLASSIFIED

Objective

• Criterion Objective:

• Given associated reference materials and this lecture,

identify potential vulnerabilities and threats to your weapon

system with at least 80% accuracy

Page 5: Cyberspace Operations (CO) 29 July 19...•Although cyber warfare is currently limited to information networks and network-attached systems, it will drastically expand in the future

5UNCLASSIFIED

UNCLASSIFIED

Objective

• Enabling Objectives:

• Given associated reference materials and this lecture,

identify basic facts and terms pertaining to Cyber

Operations with at least 80% accuracy

• Given associated reference materials and this lecture,

summarize the United States approach to Cyber

Operations with at least 80% accuracy

• Given associated reference materials and this lecture,

describe the United States adversaries approach to

Cyber Operations with at least 80% accuracy

Page 6: Cyberspace Operations (CO) 29 July 19...•Although cyber warfare is currently limited to information networks and network-attached systems, it will drastically expand in the future

6UNCLASSIFIED

UNCLASSIFIED

Introduction to Cyber Operations

Page 7: Cyberspace Operations (CO) 29 July 19...•Although cyber warfare is currently limited to information networks and network-attached systems, it will drastically expand in the future

7UNCLASSIFIED

UNCLASSIFIED

• Joint Publication 3-12 (JP 3-12) provides direction to our

joint forces with regards to the use of cyberspace

• What is the definition for Cyberspace Operations (CO)?

• JP 3-12 defines CO as “the employment of cyberspace

capabilities when the primary purpose is to achieve

objectives in or through cyberspace”

Introduction to Cyber Operations

Page 8: Cyberspace Operations (CO) 29 July 19...•Although cyber warfare is currently limited to information networks and network-attached systems, it will drastically expand in the future

8UNCLASSIFIED

UNCLASSIFIED

• What is cyberspace?

• “Cyberspace is the global domain within the information

environment consisting of the interdependent network of

information technology infrastructures and resident data,

including the internet, telecommunications networks,

computer systems, and embedded processors and

controllers”

Introduction to Cyber Operations

Page 9: Cyberspace Operations (CO) 29 July 19...•Although cyber warfare is currently limited to information networks and network-attached systems, it will drastically expand in the future

9UNCLASSIFIED

UNCLASSIFIED

• Three layers: the Physical Network Layer, the Logical

Network Layer and the Cyber-Persona Layer

The Three Layers of Cyberspace

Physical Network Layer Logical Network Layer Cyber-Persona Layer

Introduction to Cyber Operations

Page 10: Cyberspace Operations (CO) 29 July 19...•Although cyber warfare is currently limited to information networks and network-attached systems, it will drastically expand in the future

10UNCLASSIFIED

UNCLASSIFIED

• The Physical Network Layer: geographic component and

physical network component.

• The Logical Network Layer: the digital relationships or

associations that exist on a network.

• The Cyber-Persona Layer: the personnel operating the

terminals or workstations connected to the network.

Introduction to Cyber Operations

Page 11: Cyberspace Operations (CO) 29 July 19...•Although cyber warfare is currently limited to information networks and network-attached systems, it will drastically expand in the future

11UNCLASSIFIED

UNCLASSIFIED

PROGRESS CHECK

• Guided Discussion:

• Identify the three cyberspace network layers

• Give examples of the physical network layer

• Explain the cyber-persona layer

Introduction to Cyber Operations

Page 12: Cyberspace Operations (CO) 29 July 19...•Although cyber warfare is currently limited to information networks and network-attached systems, it will drastically expand in the future

12UNCLASSIFIED

UNCLASSIFIED

U.S. approach to Cyber Operations

Page 13: Cyberspace Operations (CO) 29 July 19...•Although cyber warfare is currently limited to information networks and network-attached systems, it will drastically expand in the future

13UNCLASSIFIED

UNCLASSIFIED

• Cyberspace Operations Terminology

• Joint CO consist of three general categories

• Offensive Cyberspace Operations (OCO)

• Application of force through cyberspace, authorized via

EXORD

• Defensive Cyberspace Operations (DCO)

• CO executed to defend DoD/friendly cyberspace assets

• Department of Defense Information Network (DODIN)

• Global network infrastructure used to manage critical DoD

data

U.S. approach to Cyber Operations

Page 14: Cyberspace Operations (CO) 29 July 19...•Although cyber warfare is currently limited to information networks and network-attached systems, it will drastically expand in the future

14UNCLASSIFIED

UNCLASSIFIED

• Computer Network Exploitation (CNE)

• Spying through the cyberspace domain

• Computer Network Attack (CNA)

• Offensive operations through cyberspace to achieve

strategic objectives

• Deny - prevent use of capabilities

• Degrade - reduce capabilities

• Disrupt - temporarily interfere with operations

• Destroy - cause irreparable damage

• Manipulate – control/change data, IT systems and/or

networks

U.S. approach to Cyber Operations

Page 15: Cyberspace Operations (CO) 29 July 19...•Although cyber warfare is currently limited to information networks and network-attached systems, it will drastically expand in the future

15UNCLASSIFIED

UNCLASSIFIED

PROGRESS CHECK

• Guided Discussion:

• Identify the three general categories of Joint Cyber

Operations.

• What is Computer Network Exploitation (CNE)?

• Summarize the 5 Computer Network Attack methods.

U.S. approach to Cyber Operations

Page 16: Cyberspace Operations (CO) 29 July 19...•Although cyber warfare is currently limited to information networks and network-attached systems, it will drastically expand in the future

16UNCLASSIFIED

UNCLASSIFIED

Air Force Cyber Warfare

“I think most people today understand that cyber clearly

underpins the full spectrum of military operations,

including planning, employment, monitoring, and

assessment capabilities. I can’t think of a single military

operation that is not enabled by cyber. Every major

military weapon system, command and control system,

communications path, intelligence sensor, processing and

dissemination functions—they all have critical cyber

components.”

—Gen William L. Shelton

U.S. approach to Cyber Operations

Page 17: Cyberspace Operations (CO) 29 July 19...•Although cyber warfare is currently limited to information networks and network-attached systems, it will drastically expand in the future

17UNCLASSIFIED

UNCLASSIFIED

• History

• Form of cyber warfare conducted in WWII using radio

signals

• German bombers used radio signals to find their targets

• British engineers developed countermeasures

• Broadcasted similar signals to confuse bombers

• Early use of frequency spectrum to create effects

U.S. approach to Cyber Operations

Page 18: Cyberspace Operations (CO) 29 July 19...•Although cyber warfare is currently limited to information networks and network-attached systems, it will drastically expand in the future

18UNCLASSIFIED

UNCLASSIFIED

• Lessons learned during Operation Desert Storm

• Identified importance of information to military operations,

need to protect information from adversaries and need to

exploit adversary information to gain operational advantage

• Validated by attack on Air Force networks in 1994 (Rome

Labs incident)

• In 1993 the Air Force established the Air Force

Information Warfare Center (AFIWC)

• Information superiority center of excellence, dedicated to

offensive and defensive counter information and

information operations

U.S. approach to Cyber Operations

Page 19: Cyberspace Operations (CO) 29 July 19...•Although cyber warfare is currently limited to information networks and network-attached systems, it will drastically expand in the future

19UNCLASSIFIED

UNCLASSIFIED

• In 1995 the 609th Information Warfare Squadron was

established

• Mission: Conceive, develop and field information warfare

combat capabilities

• From 1995 to 1999 the 609th Information Warfare

Squadron pioneered defensive counterintelligence

operations, then transferred mission to AFIWC

U.S. approach to Cyber Operations

Page 20: Cyberspace Operations (CO) 29 July 19...•Although cyber warfare is currently limited to information networks and network-attached systems, it will drastically expand in the future

20UNCLASSIFIED

UNCLASSIFIED

• Events that took place during this time led to increased

interest in information operation at DoD level

• Attacks on military networks: Solar Sunrise and Moonlight

Maze

• Highlighted critical vulnerabilities in US Pacific Command’s

systems, as well as in 911 and power grids in nine US

cities

• Attackers stole tens of thousands of files from the

Pentagon, National Aeronautics and Space Administration

and Department of energy

U.S. approach to Cyber Operations

Page 21: Cyberspace Operations (CO) 29 July 19...•Although cyber warfare is currently limited to information networks and network-attached systems, it will drastically expand in the future

21UNCLASSIFIED

UNCLASSIFIED

• In 1998 DoD activated Joint Task Force Computer

Network Defense under Maj Gen John Campbell

• Envisioned as having warfighting role

• In 2000 the task force was renamed to Joint Task Force

Computer Network Operations and took on and

additional offensive role

• Offensive mission later moved to Joint Forces Component

Command-Network Warfare

U.S. approach to Cyber Operations

Page 22: Cyberspace Operations (CO) 29 July 19...•Although cyber warfare is currently limited to information networks and network-attached systems, it will drastically expand in the future

22UNCLASSIFIED

UNCLASSIFIED

• National Strategy to Secure Cyberspace released in

2003 and National Military Strategy for Cyberspace

Operations released in 2006

• These documents established the strategic importance of

cyberspace to national interest

• United States Cyber Command established in 2009

U.S. approach to Cyber Operations

Page 23: Cyberspace Operations (CO) 29 July 19...•Although cyber warfare is currently limited to information networks and network-attached systems, it will drastically expand in the future

23UNCLASSIFIED

UNCLASSIFIED

• Current Cyber Operations

• Defined by a mixture of mature and developing capabilities,

doctrine, and organizations

• Initiatives

• Completed Air Force Network (AFNet) migration in 2014

• Maturation of cyber weapon systems to increase cyber

capacity in terms of number or missions conducted in

support of warfighters

U.S. approach to Cyber Operations

Page 24: Cyberspace Operations (CO) 29 July 19...•Although cyber warfare is currently limited to information networks and network-attached systems, it will drastically expand in the future

24UNCLASSIFIED

UNCLASSIFIED

• Three Operational Mission Areas

• DODIN operations, DCO and OCO

• Each mission area enables effects in the air, space, sea

and land domain

• Across spectrum of conflicts from small special operations

missions to global conventional warfare

• DODIN Operations

• Increase in weapon systems and C2 systems that rely on

network and wireless connections

• Highlights importance of DODIN

U.S. approach to Cyber Operations

Page 25: Cyberspace Operations (CO) 29 July 19...•Although cyber warfare is currently limited to information networks and network-attached systems, it will drastically expand in the future

25UNCLASSIFIED

UNCLASSIFIED

• DODIN operations construct, operate, and sustain the

cyber domain, offering mission assurance and defense

through prioritized network provisioning (dynamic

construction), hardening, and configuration

management.

• Provision access to information sources

• Harden friendly portions of the domain from unauthorized

access

• Configure network systems to provide ease of maneuver to

friendly forces

• Constrain the adversary’s options

U.S. approach to Cyber Operations

Page 26: Cyberspace Operations (CO) 29 July 19...•Although cyber warfare is currently limited to information networks and network-attached systems, it will drastically expand in the future

26UNCLASSIFIED

UNCLASSIFIED

• Twenty-Fourth Air Force manages and defends the

AFNet

• AFNet is the Air Force portion of the DODIN

• 850,000 total force users

• Billions of dollars in systems and infrastructure

U.S. approach to Cyber Operations

Page 27: Cyberspace Operations (CO) 29 July 19...•Although cyber warfare is currently limited to information networks and network-attached systems, it will drastically expand in the future

27UNCLASSIFIED

UNCLASSIFIED

• Air Force advanced AFNet’s defensive posture through

two initiatives

• Deployment of Air Force gateways reduced the number of

external network access points from 120 to 16

• Consolidated 850,000 users into a single integrated Air

Force network, enabling enterprise-wide collaboration and

improved, trusted secure communications

• This initiative delivers embedded security that substantially

reduces an adversary’s ability to act on the network by using

compromised user credentials

U.S. approach to Cyber Operations

Page 28: Cyberspace Operations (CO) 29 July 19...•Although cyber warfare is currently limited to information networks and network-attached systems, it will drastically expand in the future

28UNCLASSIFIED

UNCLASSIFIED

• DODIN defensive improvements inverted the cost/risk

calculus of attack versus defense by forcing the

adversary to work harder to find vulnerabilities/making it

easier for the defender to guard critical assets

• DODIN operators limit attack vectors and reduce

vulnerabilities by strategic placement of defensive

capabilities on the network

U.S. approach to Cyber Operations

Page 29: Cyberspace Operations (CO) 29 July 19...•Although cyber warfare is currently limited to information networks and network-attached systems, it will drastically expand in the future

29UNCLASSIFIED

UNCLASSIFIED

• DCO mission area

• Twenty-Fourth Air Force’s units prevent, detect, and

respond to enemy actions through both active and passive

defensive capabilities

• Conduct defense through a set of layered, overlapping

technologies called “defense in depth,” an architecture that

ensures monitoring and defense of avenues of access as

well as end points such as clients and servers

• DCO operators actively engage adversaries inside Air

Force networks to prevent intrusions, detect malicious

capabilities and techniques, and respond to system

compromises

U.S. approach to Cyber Operations

Page 30: Cyberspace Operations (CO) 29 July 19...•Although cyber warfare is currently limited to information networks and network-attached systems, it will drastically expand in the future

30UNCLASSIFIED

UNCLASSIFIED

• DCO operators

• Monitor defenses for signs of attack

• Configure defenses to foil future attempts

• Detect known adversary tactics (signatures)

• Limit visibility into the AFNet

• Continuously monitoring intelligence streams for indications

of pending attacks

• Analyze capabilities and methods used by adversaries

• Develop signatures that match patterns unique to a

particular attack

U.S. approach to Cyber Operations

Page 31: Cyberspace Operations (CO) 29 July 19...•Although cyber warfare is currently limited to information networks and network-attached systems, it will drastically expand in the future

31UNCLASSIFIED

UNCLASSIFIED

• Twenty-Fourth Air Force has both hunting and pursuit

capabilities to offer real-time defense and response

against adversary actions and regularly analyze

enterprise resources for indications of advanced enemy

presence or attempted access

• OCO Mission Area

• OCO have developed from being non-existent to being well

integrated into joint operations

• Mission set concentrates on gaining and maintaining

access to enemy areas of cyberspace without detection

• Requires operators to carefully plan missions to

characterize and exploit enemy networks

U.S. approach to Cyber Operations

Page 32: Cyberspace Operations (CO) 29 July 19...•Although cyber warfare is currently limited to information networks and network-attached systems, it will drastically expand in the future

32UNCLASSIFIED

UNCLASSIFIED

• OCO operators

• Provide strategic alternatives to Combatant Commanders

• Perform network reconnaissance with sophisticated TTPs

• Develop techniques, weapons, or select one from an

existing repository

• After accessing a target, operators establish a

permanent presence on the machine while cloaking

indications of the incursion, allowing them to maintain

access indefinitely

U.S. approach to Cyber Operations

Page 33: Cyberspace Operations (CO) 29 July 19...•Although cyber warfare is currently limited to information networks and network-attached systems, it will drastically expand in the future

33UNCLASSIFIED

UNCLASSIFIED

• OCO operators (continued)

• Persistent presence allows OCO operators to effectively

exploit information on the target in support of warfighter

objectives

• Adversaries can block a weapon using a specific signature

once it has been detected

U.S. approach to Cyber Operations

Page 34: Cyberspace Operations (CO) 29 July 19...•Although cyber warfare is currently limited to information networks and network-attached systems, it will drastically expand in the future

34UNCLASSIFIED

UNCLASSIFIED

• Operational planners must assess the technical gain/loss

associated with the employment of OCO weapons

• If the desired effect is not substantial enough to justify the

potential loss of an OCO weapon, then they should

consider other methods

• Increased capacity for OCO will put enemy strongholds

at risk, forcing adversaries to divert manpower and

attention to defenses and reducing the defensive burden

on US networks

U.S. approach to Cyber Operations

Page 35: Cyberspace Operations (CO) 29 July 19...•Although cyber warfare is currently limited to information networks and network-attached systems, it will drastically expand in the future

35UNCLASSIFIED

UNCLASSIFIED

• Future of US Cyberspace Operations

• Although cyber warfare is currently limited to information

networks and network-attached systems, it will drastically

expand in the future

• Cyber-based effects will not be limited to networks of

computers; rather, they will encompass all electronic

information processing systems across land, air, sea,

space, and cyberspace domains

• Full domain dominance will permit freedom of maneuver in

all war-fighting domains by holding the enemy’s electronic

information-processing systems at risk while defending

friendly systems from attack

U.S. approach to Cyber Operations

Page 36: Cyberspace Operations (CO) 29 July 19...•Although cyber warfare is currently limited to information networks and network-attached systems, it will drastically expand in the future

36UNCLASSIFIED

UNCLASSIFIED

PROGRESS CHECK

• Guided Discussion:

• What were the lessons learned identified during Operation

Desert Storm?

• What effect does DODIN defensive improvements have on

adversaries?

• Explain some of the responsibilities of OCO operators.

Adversary approach to Cyber Ops

Page 37: Cyberspace Operations (CO) 29 July 19...•Although cyber warfare is currently limited to information networks and network-attached systems, it will drastically expand in the future

37UNCLASSIFIED

UNCLASSIFIED

Adversary approach to Cyber Ops

Page 38: Cyberspace Operations (CO) 29 July 19...•Although cyber warfare is currently limited to information networks and network-attached systems, it will drastically expand in the future

38UNCLASSIFIED

UNCLASSIFIED

• Cyber warfare and the future of cyber security

• Common cyber attack targets

• Critical infrastructures

• Power grids, nuclear enrichment facilities, and missile

launch systems, civilian computers and other devices

• Many attacks rely on recruiting consumer devices into

botnets or simply using your devices as a way to infect

military and corporate networks with malware

• Everyone is exposed to the growing threats of cyber

weapons

Adversary approach to Cyber Ops

Page 39: Cyberspace Operations (CO) 29 July 19...•Although cyber warfare is currently limited to information networks and network-attached systems, it will drastically expand in the future

39UNCLASSIFIED

UNCLASSIFIED

• What is cyber warfare

• Warfare between states in the cyber realm

• Objectives of launching these attacks vary

• Motives may include

• Steal corporate or state secrets

• Disrupt critical infrastructure, or merely infect the software

behind this infrastructure and lay silent until it is needed

Adversary approach to Cyber Ops

Page 40: Cyberspace Operations (CO) 29 July 19...•Although cyber warfare is currently limited to information networks and network-attached systems, it will drastically expand in the future

40UNCLASSIFIED

UNCLASSIFIED

• What is cyber warfare continued

• Even if two states are not actively at war, they will often

launch cyber-attacks against each other.

• Launching cyber attacks is cheap and essentially

undetectable if done correctly

• Attacks can be launched covertly, and partly because there

is no internationally agreed framework for assigning blame,

or applying sanctions, for cyber-attacks

Adversary approach to Cyber Ops

Page 41: Cyberspace Operations (CO) 29 July 19...•Although cyber warfare is currently limited to information networks and network-attached systems, it will drastically expand in the future

41UNCLASSIFIED

UNCLASSIFIED

• Types of cyber attacks

• Man in the middle attacks

• A type of cyber-attack where a hacker intercepts the data

passing between you and a website, app, or server

• Phishing

• Designed to get access to your banking details, but phishing

is also commonly used in cyber warfare

• Malware

• An attacker needs to infect as many computers as possible

with malware in order to increase the chances that one of

these civilian machines will then infect the target system

Adversary approach to Cyber Ops

Page 42: Cyberspace Operations (CO) 29 July 19...•Although cyber warfare is currently limited to information networks and network-attached systems, it will drastically expand in the future

42UNCLASSIFIED

UNCLASSIFIED

• The future of cyber security

• Three key pieces of technology likely to drive the

development of cyber warfare in the coming decade

• Machine Learning and AI

• Artificial Intelligence is already being deployed in a wide range of

situations

• Likely that governments are already incorporating it into their

cyber weapons

• The Cloud

• Represents both a risk and an asset

• Distributed storage can make critical information easier to steal

• Blockchain

• Secure way to share key information between multiple users

Adversary approach to Cyber Ops

Page 43: Cyberspace Operations (CO) 29 July 19...•Although cyber warfare is currently limited to information networks and network-attached systems, it will drastically expand in the future

43UNCLASSIFIED

UNCLASSIFIED

• Adversary attack behavior model

• Shows how three key aspects of an adversary’s successful

cyberattack translate into probability of success

• Means, Motive, And Opportunity for Cyber Attacks

• Analysis of attacker behavior in the cyber realm

• Adversary must first determine which attack steps are

available options, then determine which available attack step

option is most attractive

• Success of an attempt is determined by the capability of the

adversary to execute such an attack step

Adversary approach to Cyber Ops

Page 44: Cyberspace Operations (CO) 29 July 19...•Although cyber warfare is currently limited to information networks and network-attached systems, it will drastically expand in the future

44UNCLASSIFIED

UNCLASSIFIED

• Three stages of an adversary’s attack attempt

• Opportunity: Attack Step Precondition

• Motive: Probability of Attempt

• Four attractiveness measures

• Cost to the adversary in attempting the attack step

• Payoff to the adversary for successfully executing the attack step

• Probability of successfully completing the attack step, as

perceived by the adversary

• Probability of being detected by the system during or after

attempting the attack step

• Means: Probability of Success Given Attempt

Adversary approach to Cyber Ops

Page 45: Cyberspace Operations (CO) 29 July 19...•Although cyber warfare is currently limited to information networks and network-attached systems, it will drastically expand in the future

45UNCLASSIFIED

UNCLASSIFIED

• What to do about it

• Follow local cyber security procedures

• Encrypt everything

• A powerful tool to protect your information and privacy

• Encryption stops anyone from being able to

• Read the data you are sending

• Protects you against many common forms of cyber-attack

• Using a Virtual Private Network (VPN) you can make sure that

every piece of information you send or receive online is

encrypted

• VPNs will also protect against a wide array of online threats

Adversary approach to Cyber Ops

Page 46: Cyberspace Operations (CO) 29 July 19...•Although cyber warfare is currently limited to information networks and network-attached systems, it will drastically expand in the future

46UNCLASSIFIED

UNCLASSIFIED

PROGRESS CHECK

• Guided Discussion:

• Identify the three stages of an adversary’s attack attempt

• Summarize the four attractiveness measure the contribute to

an adversary’s probability of attempt

• What is the one of the best tools you have to defend against

a cyber-attack?

Adversary approach to Cyber Ops

Page 47: Cyberspace Operations (CO) 29 July 19...•Although cyber warfare is currently limited to information networks and network-attached systems, it will drastically expand in the future

47UNCLASSIFIED

UNCLASSIFIED

• Adversary cyber profiles

• Use the “Adversary Cyber Profile” handout

• Russia

• China

• Iran

• North Korea

Adversary approach to Cyber Ops

Page 48: Cyberspace Operations (CO) 29 July 19...•Although cyber warfare is currently limited to information networks and network-attached systems, it will drastically expand in the future

48UNCLASSIFIED

UNCLASSIFIED

PROGRESS CHECK

• Open Book Discussion:

• Summarize one cyber strategy from one of the countries

identified in the handout

• Student summarize one cyber capability from one of the

countries identified in the handout

Adversary approach to Cyber Ops

Page 49: Cyberspace Operations (CO) 29 July 19...•Although cyber warfare is currently limited to information networks and network-attached systems, it will drastically expand in the future

49UNCLASSIFIED

UNCLASSIFIED

• Top 10 of the world's largest cyberattacks

• Use “TOP 10 of the world's largest cyberattacks _ Outpost

24 blog” handout

• Adobe

• Sony

• South Korea

• Target

• Alteryx

• Equifax

• Adult Friend Finder

• Marriott Hotels

• Hold Security

• Yahoo!

Adversary approach to Cyber Ops

Page 50: Cyberspace Operations (CO) 29 July 19...•Although cyber warfare is currently limited to information networks and network-attached systems, it will drastically expand in the future

50UNCLASSIFIED

UNCLASSIFIED

PROGRESS CHECK

• Open Book Discussion:

• Summarize one cyber-attack identified in the handout

• Identify protection measures your mission systems employ

that prevent these type of attacks

Adversary approach to Cyber Ops

Page 51: Cyberspace Operations (CO) 29 July 19...•Although cyber warfare is currently limited to information networks and network-attached systems, it will drastically expand in the future

51UNCLASSIFIED

UNCLASSIFIED

Summary

• Criterion Objective:

• Given associated reference materials and this lecture,

identify potential vulnerabilities and threats to your weapon

system with at least 80% accuracy

Page 52: Cyberspace Operations (CO) 29 July 19...•Although cyber warfare is currently limited to information networks and network-attached systems, it will drastically expand in the future

52UNCLASSIFIED

UNCLASSIFIED

Summary

• Enabling Objectives:

• Given associated reference materials and this lecture,

identify basic facts and terms pertaining to Cyber

Operations with at least 80% accuracy

• Given associated reference materials and this lecture,

summarize the United States approach to Cyber Operations

with at least 80% accuracy

• Given associated reference materials and this lecture,

describe the United States adversaries approach to Cyber

Operations with at least 80% accuracy

Page 53: Cyberspace Operations (CO) 29 July 19...•Although cyber warfare is currently limited to information networks and network-attached systems, it will drastically expand in the future

53

UNCLASSIFIED

UNCLASSIFIED

QUESTIONS?