Home

Inside Cyber Warfare Part 30

Inside Cyber Warfare - novelonlinefull.com

You’re read light novel Inside Cyber Warfare Part 30 online at NovelOnlineFull.com. Please use the follow button to get notification about the latest chapter next time when you visit NovelOnlineFull.com. Use F11 button to read novel in full-screen(PC only). Drop by anytime you want to read free – fast – latest novel. It’s great if you could leave a comment, share your opinion about the new chapters, new novel with others on the internet. We’ll do our best to bring you the finest, latest novel everyday. Enjoy

[211] GAO, "Defense Department Cyber Efforts: DOD Faces Challenges In Its Cyber Activities," US Government Accountability Office, July 2011, http://www.gao.gov/products/GAO-11-75.

Organization

Figure 17-1 shows the US Department of Defense's cyber organizational structure.

Figure 17-1. The cyber organizational structure The following list outlines the DOD's cyber security organizational structure, including the cyber-related roles and responsibilities of each organization.

The Joint Staff

Establishes and develops doctrine, policies, and a.s.sociated joint tactics, techniques, and procedures (TTP) for DOD's global information grid (GIG), information a.s.surance (IA), and joint and combined operations.

Ensures all joint education, training, plans, and operations include, and are consistent with, information operations (IO) policy, strategy, and doctrine.

Global Operations (Information Operations and Computer Network Operations), J-39 Focal point for IO within the Joint Staff.

Provides recommendations and advice to the President, Secretary of Defense (SECDEF), National Security Council (NSC), and Homeland Security Council (HSC) on all aspects of computer network operations (CNO).

Information and Cybers.p.a.ce Policy, J-5 Develops policy that contributes to effective execution of information and cybers.p.a.ce operations.

Develops policy that contributes to military freedom of action in cybers.p.a.ce.

Establishes joint cybers.p.a.ce policies for effective strategic planning.

Fosters joint and interagency collaboration regarding cybers.p.a.ce issues, including national cyber initiatives.

Network Operations, J-63 Develops DOD and Joint Staff strategies and positions for cybers.p.a.ce and network operations.[212]

Recommends and synchronizes cybers.p.a.ce and network operations guidance in joint doctrine.

Researches, reviews, and synchronizes DOD and joint network operations policies in DOD directives, instructions, and Joint Staff policies.

Joint Education and Doctrine, J-7 Coordinates with the military services and combatant commands to integrate computer network attack and information operations doctrine into joint doctrine for military operations.

Office of the Secretary of Defense

a.s.sistant Secretary of Defense, Network information, and Integration/DOD CIO a.s.sists SECDEF on network policies, information technology (IT), network operations, and IA.[213]

Provides strategic-level guidance and oversight for CNO including network operations and IA.

Defense Information Security Agency (DISA) Handles day-to-day management of DOD's GIG, communication, and computer-based information systems.

Office of the Under Secretary of Defense for Intelligence a.s.sists SECDEF in IO.[214]

Develops and oversees DOD IO policy and integration activities.

Establishes and oversees specific policies for the integration of CNO, including computer network attack (CNA).

Leads on IO issues within the intelligence community.

Defense Intelligence Agency (DIA) Provides all-source intelligence to combatant commanders, defense planners, and national security policymakers.

Manages, operates, and maintains own network and IA program.

National Security Agency (NSA) Provides IA support to DOD.

Prescribes minimum standards for protecting national security systems.

Provides warning support to other DOD components.

Defense Security Service (DSS) Secures technology within the Defense Industrial Base (DIB).

Oversees the protection of US and foreign cla.s.sified information in the hands of industry.

Office of the Under Secretary of Defense for Acquisition, Technology, and Logistics Incorporates policy and processes into the DOD acquisition process that supports the protection of controlled uncla.s.sified information with uncla.s.sified DIB networks.

Maintains oversight of the process to conduct damage a.s.sessments after unauthorized access to DOD information from an uncla.s.sified DIB network.

Office of the Under Secretary of Defense for Policy Provides strategic-level guidance and oversight for CNO, IA, and IO.

Leads integration of cyber policy for interagency and international coordination.

Leads integration of the planning and employment of IO capabilities outside of the intelligence community.

Office of the a.s.sistant Secretary of Defense for Global Strategic Affairs Develops policy for SECDEF on countering weapons of ma.s.s destruction, nuclear forces and missile defense, cyber security and s.p.a.ce issues.

Leads in developing a cyber security strategy for the DOD and for crafting the policy for the standup of USCYBERCOM.

Defense Technology Security Administration (DTSA) Administers the development and implementation of DOD technology security policies on international transfers of defense-related goods, services, and technologies.

Ensures that critical US military technological advantages are preserved.

US Strategic Command (USSTRATCOM)

Directs DOD's GIG operations and defense.

Plans against designated cybers.p.a.ce threats.

Advocates for cybers.p.a.ce capabilities.

Executes cybers.p.a.ce operations.

Coordinates with other combatant commands and appropriate US government agencies for matters related to cybers.p.a.ce.

Joint Information Operations Warfare Center Plans, integrates, synchronizes, and advocates for IO across DOD, including CNO, electronic warfare (EW), psychological operations (PSYOPS), military deception, and operations security.

US Cyber Command (USCYBERCOM) Facilitates the integration of cybers.p.a.ce operations for the military services.

Synchronizes DOD cyber missions and warfighting efforts and provides support to civil authorities and international partners.

US Army Cyber Command Plans, coordinates, integrates, synchronizes, and defends the army's army's portion of DOD network and conduct, and when directed, offensive operations in cybers.p.a.ce.

Army Network Enterprise Technology Command / 9th Army Signal Command Plans, engineers, installs, integrates, protects and operates Army Cybers.p.a.ce.

US Army Intelligence and Security Command Conducts intelligence, security, and information operations for military commanders and national decision makers.

1st Information Operations Command (Land) Conducts IO theory development and training.

Deploys IO support teams in order to provide IO planning support and vulnerability a.s.sessments in support of military forces.

US Fleet Cyber Command/US 10th Fleet Serves as the central operational authority for networks, intelligence, information operations, cyber, EW, and s.p.a.ce, and operates a secure and interoperable naval network.

Naval Network Warfare Command (NNWC) Directs the operations and security of the navy's portion of the GIG.

Delivers reliable and secure net-centric and s.p.a.ce war fighting capabilities in support of strategic, operational, and tactical missions across the navy.

Naval Information Operation Command (NIOC) Advances IO warfighting capabilities for Naval and Joint Forces by providing operationally focused training and planning support.

Develops doctrine, tactics, techniques, and procedures.

Advocates requirements in support of future effects-based warfare.

Manages functional data for IO.

Navy Cyber Defense Operations Command (NCDOC) Monitors, a.n.a.lyzes, detects, and responds to unauthorized activity within US Navy information systems and computer networks.

Combined Task Forces (Intentionally blank.) 24th Air Force Plans and conducts cybers.p.a.ce operations in support of combatant commands.

Maintains and defends the Air Force Enterprise Network GIG.

67th Network Warfare Wing Organizes, trains, and equips cybers.p.a.ce forces to conduct network defense, attack, and exploitation.

Executes air force network operations, training, tactics, and management for the 24th Air Force and combatant commands.

688th Information Operations Wing Aims to deliver proven IO and engineering infrastructure capabilities integrated across air, s.p.a.ce, and cybers.p.a.ce domains.

689th Combat Communications Wing Trains, deploys and delivers expenditionary and specialized communications, air traffic control, and landing systems for Humanitarian Relief Operations and dominant combat operations.

Conducts tactical operations in austere, deployed, and joint/coalition environments.

US Marine Corps Forces Cyber Command Supports US Cyber Command in all defensive and offensive mission areas.

National Guard Provides cyber capabilities to meet military service and combatant commander requirements.

Can be leveraged under state authorities to a.s.sist civil authorities.

Army National Guard (Intentionally blank.) Air Force National Guard (Intentionally blank.) Service Network Operations Security Centers Provides a secure, centralized, system management and monitoring environment for Network, Operations, and Applications infrastructure.

Provides direct support to the geographic combatant commands and marine corps forces for theater network operations issues and, in its entirety, fulfills its direct support responsibilities.

Army (Intentionally blank.) Navy (Intentionally blank.) Air Force (Intentionally blank.) Marine Corps (Intentionally blank.) Theater Network Operations Security Centers (JFCOM, NORTHCOM, SOUTHCOM, TRANSCOM, SOCOM, CENTCOM, AFRICOM, EUCOM, PACOM) Conducts computer network defense to secure each portion of the DOD GIG.

JFCOM is a voting member of the joint doctrine development community.

NORTHCOM is lead in a.s.sisting the Department of Homeland Security and other civilian agencies during cyber-related incidents as part of its Defense Support of Civil Authorities missions, or civil support.

Army (Intentionally blank.) Navy (Intentionally blank.) Air Force (Intentionally blank.) Marine Corps (Intentionally blank.) Department of Defense Criminal Investigative Services Conducts cyber-related criminal and counterintelligence investigations.

Army Counter Intelligence and Army Criminal Investigative Command (Army CID/IC) Investigates and prosecutes cyber-related criminal cases.

Investigates cyber-related counterintelligence cases.

Air Force Office of Special Investigations (AF OSI) Provides cyber-related criminal and counterintelligence investigative services to commanders throughout the air force.

Identifies, investigates, and neutralizes criminal, terrorist, and espionage threats to personnel and resources of the air force and Department of Defense.

Naval Criminal Investigative Service (NCIS) Prevents terrorism, protects secrets, reduces major crimes and executes advanced cyber technologies and methodologies to process, identify, and present electronic data of intelligence or evidentiary value.

Please click Like and leave more comments to support and keep us alive.

RECENTLY UPDATED MANGA

Keyboard Immortal

Keyboard Immortal

Keyboard Immortal Chapter 2052: Kilometers of Tombs Author(s) : 六如和尚, Monk Of The Six Illusions View : 1,264,702

Inside Cyber Warfare Part 30 summary

You're reading Inside Cyber Warfare. This manga has been translated by Updating. Author(s): Jeffrey Carr. Already has 1170 views.

It's great if you read and follow any novel on our website. We promise you that we'll bring you the latest, hottest novel everyday and FREE.

NovelOnlineFull.com is a most smartest website for reading manga online, it can automatic resize images to fit your pc screen, even on your mobile. Experience now by using your smartphone and access to NovelOnlineFull.com