Offensive Cyber Operations Part Two: Cyber Units and Their Capabilities
Copyright (c) 2021 Kovács László
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Abstract
Creating cybersecurity requires coordinated implementation of many activities. In the complex system of cybersecurity, in addition to regulatory and procedural issues, we also find active cyber defence operations. However, cyberspace operations for defence purposes alone are not always sufficient to provide full and comprehensive cybersecurity. Thus, in addition to defence cyberspace operations, it may be necessary to perform offensive cyber operations. The offensive cyberspace operations, together with tools and procedures, naturally not only contribute to the protection of our own systems, but also effectively support activities in other dimensions by intercepting, disrupting, or extracting information from counterparty infocommunication systems. The first part of the present study presents the general characteristics of offensive cyber operations, the second part analyses the practical implementation and applicability of offensive cyber operations capabilities and covers the forces of cyber operations and the tools and procedures they can apply.