Content deleted Content added
m r2.7.1) (Robot: Adding ar:شبكة عمليات الكمبيوتر |
copyedit |
||
Line 1:
'''Computer Network Operations''' ('''CNO''') is a broad term that has both military and civilian application.
==CNO in the
Within the Unite States military ___domain, CNO is considered one of five core capabilities under Information Operations (IO) [[Information Warfare]].
Computer Network Operations, in concert with electronic warfare (EW), is used primarily to disrupt, disable, degrade or deceive an enemy’s command and control, thereby crippling the enemy’s ability to make effective and timely decisions, while simultaneously protecting and preserving friendly command and control.
==Types of Military CNO==
According to ''Joint Pub 3-13'', CNO consists of computer network attack (CNA), computer network defense (CND) and computer network exploitation (CNE).<ref>[http://www.fas.org/irp/doddir/dod/jp3_13.pdf United States Joint Publication 3-13: Information Operations]</ref>
* ''Computer Network Attack'' ('''CNA'''): Includes actions taken via computer networks to disrupt, deny, degrade, or destroy the information within computers and computer networks and/or the computers/networks themselves.
* ''Computer Network Defense'' ('''CND'''): Includes actions taken via computer networks to protect, monitor, analyze, detect and respond to network attacks, intrusions, disruptions or other unauthorized actions that would compromise or cripple defense information systems and networks.
* ''Computer Network Exploitation'' ('''CNE'''): Includes enabling actions and intelligence collection via computer networks that exploit data gathered from target or enemy information systems or networks.
Line 22:
==External links==
* [http://www.cyberwarandlaw.com Cyber, War and Law]
* [http://www.leavenworth.army.mil United States Army Combined Arms Center]
|