7COM1069 : Cyber Operations
INTRODUCTION
Cyber security has become a major issue in recent times. Many countries are facing a big problem as they are not able to maintain security of data. The area of cyber space has increased and several other components are involved in it. So, it is improving the capabilities of cyber war fare. Through it, they are able to breach data and info. In addition, nations are trying to engage into political and military war in cyber space (Berger, 2017). Now a days, telecommunication and satellite is highly useful component. Black hat hackers are specialist in hacking of data in cyber space. Cyber operations are those that are conducted within cyber space. It contain transfer of data, developing policies, using computer systems, etc.
This report will discuss about different topics that are fog of war, information environment and decision making in cyber.
Fog of war in cyber space – it refers to that how at national and international level the cyber thefts are happening. In present technological world, it has become complex to maintain cyber security and crucial information. It has resulted in cyber war as hackers are hacking data of nation. Here, the main countries that are having cyber warfare capabilities are Russia and China.
In cyber space there are many black hat hackers available. They play major role in hacking data for financial gain. Black differ from white because they are security specialist who find out methods to reach security. Generally, hackers breach into national cyber security database. It enables to break protocols and exploit data. For of war in cyber space has increased to a great extent. Now, many countries are engaged into this to obtain data and info. Russia and China try to steal data of other countries (Betz, 2017). thus, area of cyber space is growing at rapid rate. So, each nation is trying to engage in this more, it has led to war between them. In this there are some nation that are not able to protect national cyber security in spite of updating their IT infrastructure. Alongside, cyber war occurs in both political and military way. National threats acquire major part in cyber space.
Information environment discussion – it is an environment where a lot of information exists and stored in database. Also, where user interact with others and share data and info. It consists of many things such as system, technology, etc. basically, cyber security is included in it. there are several components to information environment that fits into cyber space. Social network and info war fare is part of it. For example – army uses this to analyse officer position and involve attacking, defending and finding out vulnerability in cyber network. Along with it, functional areas include EW, EMSO, CNO, etc. information operations integrate in it that is shaped by use of domain to modify data. At present US army is developing cyber doctrine today. They are working on concept of cyber war fare and framework to conduct cyber operations within time frame (Briskin and et.al., 2016)
CO is global frame work that contain network of IT, infrastructure, data, internet, etc. the main purpose of CO is to support in decision making. Its implementation has resulted in improving capabilities within cyber space. However, IRC across in multiple lines in decision.
Decision making for cyber – In order to maintain cyber security, it is necessary to take effective decision. This enables in successfully identifying risk and reducing impact of cyber attack. Along with it, strategies are required to establish a frame work on make a decision. Nations and cyber experts must optimise things related to security. It enables in taking security measures. However, there occurs various friction issues in cyber space. It ensures that stability paradox constraints of cyber interaction in maintaining relationship. The issues are at global, national or individual level. so, government is required to develop strategic domain that consists of interdependent of network including internet, data, computer systems, etc. through this, it will be easy to take appropriate decisions.
Critical discussion
It can be analysed that cyber crimes has raised rapidly in recent times. This has led to war in between developed nations within cyber space to steal and hack data. However, dominance of cyber space has resulted in war (Crowther, 2017). Government is supporting black hat hackers to breach national cyber security. Moreover, it is justified that cyber war fare capabilities have increased to allow countries to engage in cyber security.
The information environment is combination of many components that are internet, system, data, etc. it covers other areas as well like cyber information, modification, etc. here, info security is a practice followed to mitigate risk. through it, unauthorised access, prevention, use, etc. of data is protected and reducing impact on incidents. This is done by both tangible and intangible way. beside this, main aim is to maintain integrity and confidentiality of data. For this, policy is formed and implemented. For instance, US have formed a policy for it. For those seeking assignment help, understanding these components and practices can provide valuable insights into how information security frameworks are developed and maintained.
Along with it, developing policy will result in providing a framework through which decisions are taken. With this, it will be easy to conduct a risk management process and determine potential threats and vulnerabilities. Apart from it, by working within the strategic domain of government, national cybersecurity will focus on ensuring that proper decisions are taken and implemented (Ottis, 2015). Furthermore, friction issues will be reduced, leading to the maintenance of data integrity and confidentiality. With the help of a strategic domain, global and national issues of cybersecurity will be addressed. Countries will be able to maintain their national cybersecurity.
For those needing assignment help or using a thesis statement generator, understanding these frameworks and their impacts on cybersecurity can be crucial in crafting well-supported arguments and solutions.
Also Read- Study of Unethical Practices on Business Environment