According to ''Joint Pub 3-13'', CNO consists of computer network attack (CNA), computer network defense (CND) and computer network exploitation (CNE).<ref>[http://www.fas.org/irp/doddir/dod/jp3_13.pdf United States Joint Publication 3-13: Information Operations]</ref>
* ''Computer Networknetwork Attackattack'' ('''CNA'''): Includes actions taken via computer networks to disrupt, deny, degrade, or destroy the information within computers and computer networks and/or the computers/networks themselves.
* ''Computer Networknetwork Defensedefense'' ('''CND'''): Includes actions taken via computer networks to protect, monitor, analyze, detect and respond to network attacks, intrusions, disruptions or other unauthorized actions that would compromise or cripple defense information systems and networks. ''Joint Pub 6.0'' further outlines Computer Network Defense as an aspect of [[NetOps]]:
* ''Computer Networknetwork Exploitationexploitation'' ('''CNE'''): Includes enabling actions and intelligence collection via computer networks that exploit data gathered from target or enemy information systems or networks.