SlideShare a Scribd company logo
BILL ROSS
15 Sept 2008
INFOSECFORCE
“ Balancing security controls to business requirements “
Title:
“ Cyber “ does not just mean Cyber Security
A paper by INFOSECFORCE
804-855-4988
infosecforce@yahoo.com
Numerous private sector, government, and military organizations use the term “cyber” as a
synonym for Cyber Security. Cyber does not equal Cyber Security. In fact, when using the generic term
“cyber” one should be thinking more about Cyber Space. I am very impressed with ARCYBER and how they
approach Cyber Space doctrine. Please see below an excerpt ARCYBER Cyberspace . Likewise, since I could not
find a graphic showing the inter relationship of Cyber Space components, I created the last graphic that does
so. The reason cyber security is in dashed lines is that Cyber Security is not considered a Cyber Space core “fire
function” in Cyber Space. It is a supporting component to Cyber Space similar to a logistics function.
“ The term cyber is most useful as part of the compound word cyberspace and cyberspace is simply the man-
made domain created when we connect all of the computers, switches, routers, fiber optic cables, wireless
devices, satellites and other components that allow us to move large amounts of data at very fast speeds. As
with the physical domains—land, maritime, air, space—we conduct a variety of activities in cyberspace to
benefit individuals, commercial entities and governments. The key difference between cyberspace and the
physical domains is that cyberspace is man-made and constantly changing. That characteristic offers both
opportunities and risk. “http://armedforcesjournal.com/cyberspace-what-is-it-where-is-it-and-who-cares/
Army doctrine for Cyber Space Operations will include: Offensive Cyberspace Operations, Defensive
Cyberspace Operations, Defensive Cyberspace Operations, Cybersecurity (my comment in support), Deny the
Adversary the FREEDOM of Action in the Domain, Cyber Effects, Cyberspace Defense, Computer Network
Defense, Cyber Electromagnetic Activities, Cyber Targeting, Cyber Protection Teams
CYBERSPACE
A global domain within the
information environment consisting
of the interdependent network of
information technology
infrastructures, including the
Internet, telecommunications
networks, computer systems, and
embedded processors and
controllers. (JP 1-02)
Intelligence community
Research, unique solutions,
IARPA level work, situational
awareness, build Cyber
Intelligence Operations Center,
work flow, collects intelligence
collection systems and
programs, intelligence
production activities,
Information Operations
integrated employment of
electronic warfare (EW), computer
network operations (CNO),
psychological operations (PSYOP),
military deception (MILDEC), and
operations security (OPSEC), in
concert with specified supporting
and related capabilities.
Signal Commands
Network Operations
(information assurance,
information dissemination
management, and network
management) and management
of the electromagnetic
spectrum.
Electronic Warfare
The integrated planning,
employment, and assessment of
military capabilities to achieve
desired effects across the
electromagnetic domain in support
of operational objectives.
Cyber Security
All organizational actions required
to ensure freedom from danger
and risk to the security of
information in all its forms
(electronic, physical), and the
security of the systems and
networks
Cyber Offense Operations
Offensive operations to destroy,
disrupt, or neutralize adversary
cyberspace capabilities both before
and after their use against friendly
forces, but as close to their source
as possible
Cyber Defense Operations
All defensive countermeasures
designed to detect, identify,
intercept, and destroy or negate
harmful activities attempting to
penetrate or attack through
cyberspace. DCC missions are
designed to preserve friendly
network
The Cyberspace Domain

More Related Content

What's hot

Internet of Things
Internet of ThingsInternet of Things
Internet of Things
Mphasis
 
Priya iot
Priya iotPriya iot
Priya iot
Priya Pandey
 
Cyber Security ( Action Against Cyber Crime )
Cyber Security ( Action Against Cyber Crime )Cyber Security ( Action Against Cyber Crime )
Cyber Security ( Action Against Cyber Crime )
TechnoHacks_Infosystem
 
recent trends in technology.pptx
recent trends in technology.pptxrecent trends in technology.pptx
recent trends in technology.pptx
keerthivemireddy
 
IoT
IoTIoT
IoT
Mphasis
 
Why a new cybersecurity paradigm for IoTs
Why a new cybersecurity paradigm for IoTsWhy a new cybersecurity paradigm for IoTs
Why a new cybersecurity paradigm for IoTs
Réda Berrehili
 
Presentation1
Presentation1Presentation1
Presentation1
Anmitas1
 
Fog computing. Igor Tsybin
Fog computing. Igor TsybinFog computing. Igor Tsybin
Fog computing. Igor Tsybin
Igor Tsybin
 
Good research paper
Good research paperGood research paper
Good research paper
Niharika Varshney
 
Digital Security
Digital SecurityDigital Security
Digital Security
accenture
 
Operation management iOT
Operation management iOTOperation management iOT
Operation management iOT
cr07adi
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
Mphasis
 
'How are organisations exploiting the Internet of Things?'
'How are organisations exploiting the Internet of Things?''How are organisations exploiting the Internet of Things?'
'How are organisations exploiting the Internet of Things?'
EPCC, University of Edinburgh
 
Smau Bologna 2013 Stefano Zanero
Smau Bologna 2013 Stefano ZaneroSmau Bologna 2013 Stefano Zanero
Smau Bologna 2013 Stefano ZaneroSMAU
 
2014 IEEE JAVA CLOUD COMPUTING PROJECT A secure client side deduplication sch...
2014 IEEE JAVA CLOUD COMPUTING PROJECT A secure client side deduplication sch...2014 IEEE JAVA CLOUD COMPUTING PROJECT A secure client side deduplication sch...
2014 IEEE JAVA CLOUD COMPUTING PROJECT A secure client side deduplication sch...
IEEEFINALSEMSTUDENTPROJECTS
 
Fog Computing and the Internet of Things
Fog Computing and the Internet of ThingsFog Computing and the Internet of Things
Fog Computing and the Internet of Things
S.Mostafa Sayyedi
 
Fog-Drone (Data Analysis on Drones)
Fog-Drone (Data Analysis on Drones)Fog-Drone (Data Analysis on Drones)
Fog-Drone (Data Analysis on Drones)
Ramneek Kalra
 
Ijscs
IjscsIjscs

What's hot (19)

Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Priya iot
Priya iotPriya iot
Priya iot
 
Cyber Security ( Action Against Cyber Crime )
Cyber Security ( Action Against Cyber Crime )Cyber Security ( Action Against Cyber Crime )
Cyber Security ( Action Against Cyber Crime )
 
recent trends in technology.pptx
recent trends in technology.pptxrecent trends in technology.pptx
recent trends in technology.pptx
 
IoT
IoTIoT
IoT
 
Why a new cybersecurity paradigm for IoTs
Why a new cybersecurity paradigm for IoTsWhy a new cybersecurity paradigm for IoTs
Why a new cybersecurity paradigm for IoTs
 
Presentation1
Presentation1Presentation1
Presentation1
 
Fog computing. Igor Tsybin
Fog computing. Igor TsybinFog computing. Igor Tsybin
Fog computing. Igor Tsybin
 
Good research paper
Good research paperGood research paper
Good research paper
 
Digital Security
Digital SecurityDigital Security
Digital Security
 
Operation management iOT
Operation management iOTOperation management iOT
Operation management iOT
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
'How are organisations exploiting the Internet of Things?'
'How are organisations exploiting the Internet of Things?''How are organisations exploiting the Internet of Things?'
'How are organisations exploiting the Internet of Things?'
 
Smau Bologna 2013 Stefano Zanero
Smau Bologna 2013 Stefano ZaneroSmau Bologna 2013 Stefano Zanero
Smau Bologna 2013 Stefano Zanero
 
2014 IEEE JAVA CLOUD COMPUTING PROJECT A secure client side deduplication sch...
2014 IEEE JAVA CLOUD COMPUTING PROJECT A secure client side deduplication sch...2014 IEEE JAVA CLOUD COMPUTING PROJECT A secure client side deduplication sch...
2014 IEEE JAVA CLOUD COMPUTING PROJECT A secure client side deduplication sch...
 
Fog Computing and the Internet of Things
Fog Computing and the Internet of ThingsFog Computing and the Internet of Things
Fog Computing and the Internet of Things
 
Mian
MianMian
Mian
 
Fog-Drone (Data Analysis on Drones)
Fog-Drone (Data Analysis on Drones)Fog-Drone (Data Analysis on Drones)
Fog-Drone (Data Analysis on Drones)
 
Ijscs
IjscsIjscs
Ijscs
 

Viewers also liked

Cyber Space
Cyber SpaceCyber Space
Cyber Space
Kashif Latif
 
Steve Rieber
Steve RieberSteve Rieber
Steve Rieber
AFCEA International
 
USSTRATCOM Cyber & Space 2011 Mark Maybury
USSTRATCOM Cyber & Space 2011 Mark Maybury USSTRATCOM Cyber & Space 2011 Mark Maybury
USSTRATCOM Cyber & Space 2011 Mark Maybury
AFCEA International
 
William Halal
William HalalWilliam Halal
William Halal
AFCEA International
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
nitss007
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 

Viewers also liked (6)

Cyber Space
Cyber SpaceCyber Space
Cyber Space
 
Steve Rieber
Steve RieberSteve Rieber
Steve Rieber
 
USSTRATCOM Cyber & Space 2011 Mark Maybury
USSTRATCOM Cyber & Space 2011 Mark Maybury USSTRATCOM Cyber & Space 2011 Mark Maybury
USSTRATCOM Cyber & Space 2011 Mark Maybury
 
William Halal
William HalalWilliam Halal
William Halal
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 

Similar to Cyber_Space_is_not_Cyber_Security

Bullet Proof Cyber Space Security .pdf
Bullet Proof Cyber Space Security .pdfBullet Proof Cyber Space Security .pdf
Bullet Proof Cyber Space Security .pdf
Venkataraman Mudaliar M L
 
Cyber Space Operation- Offensive Cyber Space Operation
Cyber Space Operation- Offensive Cyber Space OperationCyber Space Operation- Offensive Cyber Space Operation
Cyber Space Operation- Offensive Cyber Space Operation
Rubal Sagwal
 
Honeypots in Cyberwar
Honeypots in CyberwarHoneypots in Cyberwar
Honeypots in Cyberwar
Mehdi Poustchi Amin
 
small-dumb-cheap-and-copious-the-future-of-the-internet-of-things
small-dumb-cheap-and-copious-the-future-of-the-internet-of-thingssmall-dumb-cheap-and-copious-the-future-of-the-internet-of-things
small-dumb-cheap-and-copious-the-future-of-the-internet-of-things
MeshDynamics
 
An Overview of Cyber Attack and Computer Network Operations Si.docx
An Overview of Cyber Attack and Computer Network Operations Si.docxAn Overview of Cyber Attack and Computer Network Operations Si.docx
An Overview of Cyber Attack and Computer Network Operations Si.docx
nettletondevon
 
An Overview of Cyber Attack and Computer Network Operations Si.docx
An Overview of Cyber Attack and Computer Network Operations Si.docxAn Overview of Cyber Attack and Computer Network Operations Si.docx
An Overview of Cyber Attack and Computer Network Operations Si.docx
galerussel59292
 
Seceon-Case-Study-Smart-Government-Cybersecurity (1).pptx
Seceon-Case-Study-Smart-Government-Cybersecurity (1).pptxSeceon-Case-Study-Smart-Government-Cybersecurity (1).pptx
Seceon-Case-Study-Smart-Government-Cybersecurity (1).pptx
CompanySeceon
 
A Systematic Literature Review On The Cyber Security
A Systematic Literature Review On The Cyber SecurityA Systematic Literature Review On The Cyber Security
A Systematic Literature Review On The Cyber Security
Amy Cernava
 
Cyber Security Course
Cyber Security CourseCyber Security Course
Cyber Security Course
David Smith
 
Insecure magazine - 52
Insecure magazine - 52Insecure magazine - 52
Insecure magazine - 52
Felipe Prado
 
Cyber security: challenges for society- literature review
Cyber security: challenges for society- literature reviewCyber security: challenges for society- literature review
Cyber security: challenges for society- literature review
IOSR Journals
 
Cybersecurity and the Role of Converged Infrastructure June 2016
Cybersecurity and the Role of Converged  Infrastructure June 2016Cybersecurity and the Role of Converged  Infrastructure June 2016
Cybersecurity and the Role of Converged Infrastructure June 2016David Rubal, CISSP
 
Hot Cyber Security Technologies
Hot Cyber Security TechnologiesHot Cyber Security Technologies
Hot Cyber Security Technologies
RuchikaSachdeva4
 
Emerging Technologies 3.0.pdf
Emerging Technologies 3.0.pdfEmerging Technologies 3.0.pdf
Emerging Technologies 3.0.pdf
Dr. Naveed Siddiqui
 
Emerging Technologies 33.0.pdf
Emerging Technologies 33.0.pdfEmerging Technologies 33.0.pdf
Emerging Technologies 33.0.pdf
Naveed Ahmed Siddiqui
 
THE SIGNIFICANCE OF CYBERSECURITY
THE SIGNIFICANCE OF CYBERSECURITY THE SIGNIFICANCE OF CYBERSECURITY
THE SIGNIFICANCE OF CYBERSECURITY
HilalHarris
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
IJNSA Journal
 
Secure your Space: The Internet of Things
Secure your Space: The Internet of ThingsSecure your Space: The Internet of Things
Secure your Space: The Internet of Things
The Security of Things Forum
 
Mirror mirrror
Mirror mirrrorMirror mirrror
Mirror mirrror
Flinturgy
 
ES_15 Author- Neha Nikhade
ES_15 Author- Neha NikhadeES_15 Author- Neha Nikhade
ES_15 Author- Neha Nikhade
Cy-Fi Arts Festival 2019
 

Similar to Cyber_Space_is_not_Cyber_Security (20)

Bullet Proof Cyber Space Security .pdf
Bullet Proof Cyber Space Security .pdfBullet Proof Cyber Space Security .pdf
Bullet Proof Cyber Space Security .pdf
 
Cyber Space Operation- Offensive Cyber Space Operation
Cyber Space Operation- Offensive Cyber Space OperationCyber Space Operation- Offensive Cyber Space Operation
Cyber Space Operation- Offensive Cyber Space Operation
 
Honeypots in Cyberwar
Honeypots in CyberwarHoneypots in Cyberwar
Honeypots in Cyberwar
 
small-dumb-cheap-and-copious-the-future-of-the-internet-of-things
small-dumb-cheap-and-copious-the-future-of-the-internet-of-thingssmall-dumb-cheap-and-copious-the-future-of-the-internet-of-things
small-dumb-cheap-and-copious-the-future-of-the-internet-of-things
 
An Overview of Cyber Attack and Computer Network Operations Si.docx
An Overview of Cyber Attack and Computer Network Operations Si.docxAn Overview of Cyber Attack and Computer Network Operations Si.docx
An Overview of Cyber Attack and Computer Network Operations Si.docx
 
An Overview of Cyber Attack and Computer Network Operations Si.docx
An Overview of Cyber Attack and Computer Network Operations Si.docxAn Overview of Cyber Attack and Computer Network Operations Si.docx
An Overview of Cyber Attack and Computer Network Operations Si.docx
 
Seceon-Case-Study-Smart-Government-Cybersecurity (1).pptx
Seceon-Case-Study-Smart-Government-Cybersecurity (1).pptxSeceon-Case-Study-Smart-Government-Cybersecurity (1).pptx
Seceon-Case-Study-Smart-Government-Cybersecurity (1).pptx
 
A Systematic Literature Review On The Cyber Security
A Systematic Literature Review On The Cyber SecurityA Systematic Literature Review On The Cyber Security
A Systematic Literature Review On The Cyber Security
 
Cyber Security Course
Cyber Security CourseCyber Security Course
Cyber Security Course
 
Insecure magazine - 52
Insecure magazine - 52Insecure magazine - 52
Insecure magazine - 52
 
Cyber security: challenges for society- literature review
Cyber security: challenges for society- literature reviewCyber security: challenges for society- literature review
Cyber security: challenges for society- literature review
 
Cybersecurity and the Role of Converged Infrastructure June 2016
Cybersecurity and the Role of Converged  Infrastructure June 2016Cybersecurity and the Role of Converged  Infrastructure June 2016
Cybersecurity and the Role of Converged Infrastructure June 2016
 
Hot Cyber Security Technologies
Hot Cyber Security TechnologiesHot Cyber Security Technologies
Hot Cyber Security Technologies
 
Emerging Technologies 3.0.pdf
Emerging Technologies 3.0.pdfEmerging Technologies 3.0.pdf
Emerging Technologies 3.0.pdf
 
Emerging Technologies 33.0.pdf
Emerging Technologies 33.0.pdfEmerging Technologies 33.0.pdf
Emerging Technologies 33.0.pdf
 
THE SIGNIFICANCE OF CYBERSECURITY
THE SIGNIFICANCE OF CYBERSECURITY THE SIGNIFICANCE OF CYBERSECURITY
THE SIGNIFICANCE OF CYBERSECURITY
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
 
Secure your Space: The Internet of Things
Secure your Space: The Internet of ThingsSecure your Space: The Internet of Things
Secure your Space: The Internet of Things
 
Mirror mirrror
Mirror mirrrorMirror mirrror
Mirror mirrror
 
ES_15 Author- Neha Nikhade
ES_15 Author- Neha NikhadeES_15 Author- Neha Nikhade
ES_15 Author- Neha Nikhade
 

More from Bill Ross

Cyber Security Command, Control, Communications, Computers Intelligence Surve...
Cyber Security Command, Control, Communications, Computers Intelligence Surve...Cyber Security Command, Control, Communications, Computers Intelligence Surve...
Cyber Security Command, Control, Communications, Computers Intelligence Surve...
Bill Ross
 
Cyber_Warfare_Escalation_to_Nuclear_Warfare_Examination
Cyber_Warfare_Escalation_to_Nuclear_Warfare_ExaminationCyber_Warfare_Escalation_to_Nuclear_Warfare_Examination
Cyber_Warfare_Escalation_to_Nuclear_Warfare_ExaminationBill Ross
 
Infosecforce security services
Infosecforce security servicesInfosecforce security services
Infosecforce security services
Bill Ross
 
Secure by design and secure software development
Secure by design and secure software developmentSecure by design and secure software development
Secure by design and secure software development
Bill Ross
 
INFOSECFORCE Risk Management Framework Transition Plan
INFOSECFORCE Risk Management Framework Transition PlanINFOSECFORCE Risk Management Framework Transition Plan
INFOSECFORCE Risk Management Framework Transition Plan
Bill Ross
 
Security architecture analyses brief 21 april 2015
Security architecture analyses brief 21 april 2015Security architecture analyses brief 21 april 2015
Security architecture analyses brief 21 april 2015
Bill Ross
 
INFOSECFORCE llc security services
INFOSECFORCE llc security servicesINFOSECFORCE llc security services
INFOSECFORCE llc security services
Bill Ross
 
" Soviet Military Doctrine ... a Blueprint for the Future or an Indictment of...
" Soviet Military Doctrine ... a Blueprint for the Future or an Indictment of..." Soviet Military Doctrine ... a Blueprint for the Future or an Indictment of...
" Soviet Military Doctrine ... a Blueprint for the Future or an Indictment of...
Bill Ross
 
Cyber Intelligence Operations Center
Cyber Intelligence Operations CenterCyber Intelligence Operations Center
Cyber Intelligence Operations Center
Bill Ross
 
" The Invisible Person ... the Security Architect "
" The Invisible Person ... the Security Architect "" The Invisible Person ... the Security Architect "
" The Invisible Person ... the Security Architect "
Bill Ross
 
Security Lifecycle Management Process
Security Lifecycle Management ProcessSecurity Lifecycle Management Process
Security Lifecycle Management Process
Bill Ross
 

More from Bill Ross (11)

Cyber Security Command, Control, Communications, Computers Intelligence Surve...
Cyber Security Command, Control, Communications, Computers Intelligence Surve...Cyber Security Command, Control, Communications, Computers Intelligence Surve...
Cyber Security Command, Control, Communications, Computers Intelligence Surve...
 
Cyber_Warfare_Escalation_to_Nuclear_Warfare_Examination
Cyber_Warfare_Escalation_to_Nuclear_Warfare_ExaminationCyber_Warfare_Escalation_to_Nuclear_Warfare_Examination
Cyber_Warfare_Escalation_to_Nuclear_Warfare_Examination
 
Infosecforce security services
Infosecforce security servicesInfosecforce security services
Infosecforce security services
 
Secure by design and secure software development
Secure by design and secure software developmentSecure by design and secure software development
Secure by design and secure software development
 
INFOSECFORCE Risk Management Framework Transition Plan
INFOSECFORCE Risk Management Framework Transition PlanINFOSECFORCE Risk Management Framework Transition Plan
INFOSECFORCE Risk Management Framework Transition Plan
 
Security architecture analyses brief 21 april 2015
Security architecture analyses brief 21 april 2015Security architecture analyses brief 21 april 2015
Security architecture analyses brief 21 april 2015
 
INFOSECFORCE llc security services
INFOSECFORCE llc security servicesINFOSECFORCE llc security services
INFOSECFORCE llc security services
 
" Soviet Military Doctrine ... a Blueprint for the Future or an Indictment of...
" Soviet Military Doctrine ... a Blueprint for the Future or an Indictment of..." Soviet Military Doctrine ... a Blueprint for the Future or an Indictment of...
" Soviet Military Doctrine ... a Blueprint for the Future or an Indictment of...
 
Cyber Intelligence Operations Center
Cyber Intelligence Operations CenterCyber Intelligence Operations Center
Cyber Intelligence Operations Center
 
" The Invisible Person ... the Security Architect "
" The Invisible Person ... the Security Architect "" The Invisible Person ... the Security Architect "
" The Invisible Person ... the Security Architect "
 
Security Lifecycle Management Process
Security Lifecycle Management ProcessSecurity Lifecycle Management Process
Security Lifecycle Management Process
 

Cyber_Space_is_not_Cyber_Security

  • 1. BILL ROSS 15 Sept 2008 INFOSECFORCE “ Balancing security controls to business requirements “ Title: “ Cyber “ does not just mean Cyber Security A paper by INFOSECFORCE 804-855-4988 infosecforce@yahoo.com
  • 2. Numerous private sector, government, and military organizations use the term “cyber” as a synonym for Cyber Security. Cyber does not equal Cyber Security. In fact, when using the generic term “cyber” one should be thinking more about Cyber Space. I am very impressed with ARCYBER and how they approach Cyber Space doctrine. Please see below an excerpt ARCYBER Cyberspace . Likewise, since I could not find a graphic showing the inter relationship of Cyber Space components, I created the last graphic that does so. The reason cyber security is in dashed lines is that Cyber Security is not considered a Cyber Space core “fire function” in Cyber Space. It is a supporting component to Cyber Space similar to a logistics function. “ The term cyber is most useful as part of the compound word cyberspace and cyberspace is simply the man- made domain created when we connect all of the computers, switches, routers, fiber optic cables, wireless devices, satellites and other components that allow us to move large amounts of data at very fast speeds. As with the physical domains—land, maritime, air, space—we conduct a variety of activities in cyberspace to benefit individuals, commercial entities and governments. The key difference between cyberspace and the physical domains is that cyberspace is man-made and constantly changing. That characteristic offers both opportunities and risk. “http://armedforcesjournal.com/cyberspace-what-is-it-where-is-it-and-who-cares/ Army doctrine for Cyber Space Operations will include: Offensive Cyberspace Operations, Defensive Cyberspace Operations, Defensive Cyberspace Operations, Cybersecurity (my comment in support), Deny the Adversary the FREEDOM of Action in the Domain, Cyber Effects, Cyberspace Defense, Computer Network Defense, Cyber Electromagnetic Activities, Cyber Targeting, Cyber Protection Teams
  • 3. CYBERSPACE A global domain within the information environment consisting of the interdependent network of information technology infrastructures, including the Internet, telecommunications networks, computer systems, and embedded processors and controllers. (JP 1-02) Intelligence community Research, unique solutions, IARPA level work, situational awareness, build Cyber Intelligence Operations Center, work flow, collects intelligence collection systems and programs, intelligence production activities, Information Operations integrated employment of electronic warfare (EW), computer network operations (CNO), psychological operations (PSYOP), military deception (MILDEC), and operations security (OPSEC), in concert with specified supporting and related capabilities. Signal Commands Network Operations (information assurance, information dissemination management, and network management) and management of the electromagnetic spectrum. Electronic Warfare The integrated planning, employment, and assessment of military capabilities to achieve desired effects across the electromagnetic domain in support of operational objectives. Cyber Security All organizational actions required to ensure freedom from danger and risk to the security of information in all its forms (electronic, physical), and the security of the systems and networks Cyber Offense Operations Offensive operations to destroy, disrupt, or neutralize adversary cyberspace capabilities both before and after their use against friendly forces, but as close to their source as possible Cyber Defense Operations All defensive countermeasures designed to detect, identify, intercept, and destroy or negate harmful activities attempting to penetrate or attack through cyberspace. DCC missions are designed to preserve friendly network The Cyberspace Domain