Accession Number : ADA422320


Title :   Computer Network Operations Methodology


Descriptive Note : Master's thesis


Corporate Author : NAVAL POSTGRADUATE SCHOOL MONTEREY CA


Personal Author(s) : Vega, Juan C


Full Text : https://apps.dtic.mil/dtic/tr/fulltext/u2/a422320.pdf


Report Date : Mar 2004


Pagination or Media Count : 109


Abstract : All nations face increasing tension between exploiting Computer Network Operations (CNO) in the military sphere and protecting the global information grid. The United States is moving apace to develop doctrines and capabilities that will allow them to exploit cyberspace for military advantage. Within the broad rubric of Information Operations, there is increasing effort devoted to integrating CNO into routine military planning. At the same time, these nations are becoming increasingly concerned at the dependency of their militaries, governments, economies and societies on the networked information systems that are emerging as the central nervous systems of post-industrial society. The armed forces desire to exploit and use CNO to their advantage is the central argument for this developed concept. This new weapons platform, or CNO, can be clearly identified so that the leaders will have an understanding of terms, limitations and capabilities of cyber operations. A methodology incorporating doctrine can be created to identify the Rules of Engagement (ROE) as well as the CNO components. The CNO area of operations and area of interest reach far beyond the typical battle space. The battle space has evolved and has penetrated every element of military operations that utilize computers and networks.


Descriptors :   *COMPUTER NETWORKS , *CYBERTERRORISM , MILITARY OPERATIONS , METHODOLOGY , DECISION MAKING , THESES , MILITARY PLANNING , MILITARY TACTICS , ELECTRONIC SECURITY , INFORMATION WARFARE


Subject Categories : Information Science
      Computer Systems


Distribution Statement : APPROVED FOR PUBLIC RELEASE