“The physical and logical space in which virtual processes exist which influence physical activity, physical life, and logic interactions.”
In the emerging cyberspace, it is possible to see a range of current and developing enterprises characterized by new effort, which may be compared to military conceptualization of the “emerging battlefield”, in which it is necessary to cope with diverse cyber attacks of varying strength that can upset the enemy’s functional equilibrium.
As such, cyberspace brings good news to humanity, but its very dependence on the human factor embodies substantial built-in vulnerability, both in error, but especially through malicious behavior. It can therefore be concluded that the “force multiplier” in cyber technology is liable to turn, if wrongly used, into a “damage multiplier”.
The cyber effort basically comprises three overlapping dimensions/interfaces:
Data protection and support technologies – including integrated actions to prevent harm to data completeness and reliability, and protecting the availability of support technologies’ capabilities and immunity of support systems
Intelligence gathering – listening and gathering information about the opponent’s systems for inquiry, counterintelligence, and intelligence investigation of the information
Intelligence warfare – all operations intended to disrupt, up to the point of paralyzing, functional continuity through information- and embedded computer systems
Hi, this is a comment.
To get started with moderating, editing, and deleting comments, please visit the Comments screen in the dashboard.
Commenter avatars come from Gravatar.