Offensive Strategy
Crafting a successful strategy requires a clearly defined goal. Computer Network Exploitation (CNE) goals are human in nature. The goals are achieved through five operational objectives: strategic collection, directed collection, non‐kinetic computer network attack, strategic access, and positional...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buchkapitel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | Crafting a successful strategy requires a clearly defined goal. Computer Network Exploitation (CNE) goals are human in nature. The goals are achieved through five operational objectives: strategic collection, directed collection, non‐kinetic computer network attack, strategic access, and positional access, which in turn all require the same foundational means: sustained undetected access. Crafting a successful strategy requires embracing the fundamental truths of the space. The three foundational principles of humanity, access, and economy form these truths. Knowledge is the in‐depth understanding of the technical aspects of architecture, operating systems, networks, as well as understanding the psychological aspects of people and organizations. Technical knowledge makes more economical use of limited resources. Program security contemplates and prepares for the compromising of Attacker tools and operational methods. Attackers can improve the quality of their questions, and thus their tactical decisions, by examining the situation and fashioning questions through the lens of the framework. |
---|---|
DOI: | 10.1002/9781119183440.ch7 |