“The physical and logical space in which virtual processes exist which influence physical activity, physical life, and logic interactions.”

In the emerging cyberspace, it is possible to see a range of current and developing enterprises characterized by new effort, which may be compared  to military conceptualization of the “emerging battlefield”, in which it is necessary to cope with diverse cyber attacks of varying strength that can upset the enemy’s functional equilibrium.

As such, cyberspace brings good news to humanity, but its very dependence on the human factor embodies substantial built-in vulnerability, both in error, but especially through malicious behavior.  It can therefore be concluded that the “force multiplier” in cyber technology is liable to turn, if wrongly used, into a “damage multiplier”.

The cyber effort basically comprises three overlapping dimensions/interfaces:

Data protection and support technologies – including integrated actions to prevent harm to data completeness and reliability, and protecting the availability of support technologies’ capabilities and immunity of support systems

Intelligence gathering – listening and gathering information about the opponent’s systems for inquiry, counterintelligence, and intelligence investigation of the information

Intelligence warfare – all operations intended to disrupt, up to the point of paralyzing, functional continuity through information- and embedded computer systems

One Response

Leave a Reply

Your email address will not be published. Required fields are marked *