Lesson_5_-_Cyberspace_-_a_Contested_Domain

Lesson_5_-_Cyberspace_-_a_Contested_Domain - The...

Info iconThis preview shows pages 1–16. Sign up to view the full content.

View Full Document Right Arrow Icon
CYBERSPACE CYBERSPACE A Global War-fighting Domain A Global War-fighting Domain Every minute of every day, Airmen in the United States Air Force are flying and fighting in cyberspace
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Right Now… Right Now… Cyber Attack
Background image of page 2
Right Now… Right Now… Cyber Theft
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Right Now… Right Now… Cyber Defense
Background image of page 4
Right Now… Right Now… Cyber Offense
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Right Now… Right Now… Cyber Espionage
Background image of page 6
Cyberspace Defined Cyberspace Defined Cyberspace Domain A man-made, interconnected operational realm characterized by use of the electromagnetic spectrum to manipulate information.
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Cross Domain Operations Cross Domain Operations Cyberspace – Land – Air – Sea - Space
Background image of page 8
AF Cyber Mission AF Cyber Mission 24 AF Mission “…to extend, operate and defend the Air Force portion of the Department of Defense network while providing the full spectrum of cyber capabilities for the joint war fighter”
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Space Superiority Air Superiority Cyberspace Superiority Air Force Core Functions Air Force Core Functions
Background image of page 10
Background image of page 11

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Background image of page 12
Background image of page 13

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Background image of page 14
Background image of page 15

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Background image of page 16
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: The operational advantage in, through, and from cyberspace to conduct operations at a given time and in a given domain without prohibitive interference Cyber Superiority Cyber Superiority Mission Assurance Mission Assurance ? ? ? ? ? Threats and Vulnerabilities Threats and Vulnerabilities Threat = Capability + Intent Military Critical Technology Annual Report to Congress Countries Targeting The U.S. Number Reported Incidents FY10 FY 09 FY08 FY 2010 FY 2009 Information Systems 25 22 21 63 47 Sensors & Lasers 17 11 8 40 46 Electronics 11 9 7 32 37 Armaments/ Energetic Material 12 10 9 44 26 Aeronautics 12 10 9 36 36 Marine Systems 6 4 2 32 24 Guidance / Navigation Technologies 8 4 2 26 15 Space Systems Technologies 6 5 3 22 19 Threat = Capability + Intent Threats Threats Vulnerability = Weakness Operating Systems Poor Practices Applications Operator Vulnerabilities Vulnerabilities...
View Full Document

This note was uploaded on 01/04/2012 for the course AERO 19 taught by Professor Jaredgrady during the Fall '11 term at UCLA.

Page1 / 16

Lesson_5_-_Cyberspace_-_a_Contested_Domain - The...

This preview shows document pages 1 - 16. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online