Designing a Modern CND Strategy
Modern CND strategies must be designed to defeat both nation-state level capabilities and those of asymmetric actors like hackers, organized crime, and even corporate employees seeking to engage in corporate espionage. Thus, a CND strategy makes use of many traditional information security design elements layered with government- and military-specific procedures, policies, and technologies. The additional considerations these designs take into account reflect the needs of military operations, such as chain of command, classification, and resistance to electronic warfare (as opposed to cyberwarfare). The hardware, operating systems, and software they are deployed on may be significantly different from their civilian ...
Get Cyberwarfare: Information Operations in a Connected World, 2nd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.