Computer network operations

Computer network operations

Computer Network Operations (CNO) is a broad term that has both military and civilian application. Conventional wisdom is that information is power, and more and more of the information necessary to make decisions is digitized and conveyed over an ever expanding network of computers and other electronic devices. CNO are the deliberate actions taken to leverage and optimize these networks to improve human endeavor and enterprise or, in warfare, to gain information superiority and deny the enemy this enabling capability.

Contents

CNO in the Military Domain

Within the military domain, CNO is considered one of five core capabilities under Information Operations (IO) Information Warfare. The other capabilities include Psychological Operations (PSYOP), Military Deception (MILDEC), Operations Security (OPSEC) and Electronic Warfare (EW).

Computer Network Operations, in concert with EW, is used primarily to disrupt, disable, degrade or deceive an enemy’s command and control, thereby crippling the enemy’s ability to make effective and timely decisions, while simultaneously protecting and preserving friendly command and control.

Types of Military CNO

According to Joint Pub 3-13, CNO consists of computer network attack (CNA), computer network defense (CND) and computer network exploitation (CNE).

  • Computer Network Attack (CNA): Includes actions taken via computer networks to disrupt, deny, degrade, or destroy the information within computers and computer networks and/or the computers/networks themselves.
  • Computer Network Defense (CND): Includes actions taken via computer networks to protect, monitor, analyze, detect and respond to network attacks, intrusions, disruptions or other unauthorized actions that would compromise or cripple defense information systems and networks. Joint Pub 6.0 further outlines Computer Network Defense as an aspect of NetOps
  • Computer Network Exploitation (CNE): Includes enabling actions and intelligence collection via computer networks that exploit data gathered from target or enemy information systems or networks.

See also

References

External links


Wikimedia Foundation. 2010.

Игры ⚽ Нужно решить контрольную?

Look at other dictionaries:

  • Computer Network Operations — (CNO) (dt. Computer Netzwerk Operationen) ist ein militärischer Begriff der mehrere Unterbegriffe umfasst. Inhaltsverzeichnis 1 Computer Network Attack 2 Computer Network Defense 3 Computer Network Exploitation …   Deutsch Wikipedia

  • computer network attack — Operations to disrupt, deny, degrade, or destroy information resident in computers and computer networks, or the computers and networks themselves. Electronic attack (EA) can be used against a computer, but it is not computer network attack (CNA) …   Military dictionary

  • Network operations center — Overview of a typical NOC. Lot of monitors (front), backbone overview (back) and news broadcast on TV set (right) A network operations center (or NOC, pronounced like the word knock ) is one or more locations from which control is exercised over… …   Wikipedia

  • Joint Task Force-Global Network Operations — (JTF GNO) is a subordinate command of the United States Strategic Command.Mission statementThe Joint Task Force Global Network Operations directs the operation and defense of the Global Information Grid (GIG) across strategic, operational, and… …   Wikipedia

  • 50th Network Operations Group — The 50th Network Operations Group (50 NOG) is a unit of the 50th Space Wing at Schriever Air Force Base, Colorado. 50th NOG is the single focal point for operating and maintaining the $8.2 billion Air Force Satellite Control Network and all 50 SW …   Wikipedia

  • computer science — computer scientist. the science that deals with the theory and methods of processing information in digital computers, the design of computer hardware and software, and the applications of computers. [1970 75] * * * Study of computers, their… …   Universalium

  • Operations, administration and management — or operations, administration and maintenance (OA M or OAM) is a general term used to describe the processes, activities, tools, standards, etc involved with operating, administering, managing and maintaining any system. It is more commonly used… …   Wikipedia

  • Computer crime — Computer crime, or cybercrime, refers to any crime that involves a computer and a network.[1] The computer may have been used in the commission of a crime, or it may be the target.[2] Netcrime refers to criminal exploitation of the Internet.[3]… …   Wikipedia

  • Network administrator — Network engineer redirects here. For other uses, see Network engineering (disambiguation). A network administrator, network analyst or network engineer is a person responsible for the maintenance of computer hardware and software that comprises a …   Wikipedia

  • computer — computerlike, adj. /keuhm pyooh teuhr/, n. 1. Also called processor. an electronic device designed to accept data, perform prescribed mathematical and logical operations at high speed, and display the results of these operations. Cf. analog… …   Universalium

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”