□ Cyber attack operations
○ Summary : The operation that attacks cyberspace of enemy with cyber attack capability of the ally.
○ Feature : When cyber attacks are influential that they are similar to armed operations, they are considered to use of force(Tallinn Manual).
○ Life cycle : Target analysis -> Securing access road -> Attack -> Evaluation/supplementation
* Target analysis : Analyzing target's feature, bad influence, vulnerability, importance etc.
□ Cyber defense operations
○ Summary : The operation that defends cyberspace of ally from cyber attack capability of enemy.
○ Feature
- This secures the availability of the cyberspace of ally by defending the enemy's attack.
- Because the enemy's cyber weapons are evolved continuingly, the defense system of ally must periodically be reflected with new technologies.
○ Life cycle : Threat analysis -> Detection/Prevention -> Response -> Evaluation/supplementation
* Threat analysis : Collecting and analyzing cyber attack capability of enemy.
□ Network operations
○ Summary : The operation that manages/administers cyberspace of ally.
* managing/administerating cyberspace : Network manage, backup, solving error, managing account, patch etc.
○ Feature : This secures the availability of the cyberspace of ally from the surrounding environment.
○ Life cycle : Managing system(Add, change, remove, move) -> Responding to system failure -> Recovery -> Evaluation/supplementation
P.S. Cyberspace : It is a virtual space created by information systems, and data is circulated.