ºÝºÝߣshows by User: mikkoj / http://www.slideshare.net/images/logo.gif ºÝºÝߣshows by User: mikkoj / Tue, 15 Oct 2013 12:23:59 GMT ºÝºÝߣShare feed for ºÝºÝߣshows by User: mikkoj The Elements of Offensive Cyber Warfare Operations /slideshow/the-elementsofoffensivecyberwarfareoperations2/27213650 the-elements-of-offensive-cyber-warfare-operations2-131015122359-phpapp01
This document defines a concept of operations for cyber warfare in targeting, accessing and running operations within allocated information space. Maneuvering offensive operations in such an information space requires a framework to handle operational tasks such as target recognition, payload delivery and execution. The joint requirements such as planning and tasking with other interoperable dimensions make things very difficult without such a framework approach. In the worst case each of the elements is being handled in un-coordinated manner, rendering effects of potential capabilities low and simultaneously possessing a threat for manipulating organizations. Based on the understanding shown, offensive cyber warfare operates quite differently compared to its kinetic counterparts. It creates its own operational theory and models not directly aligned with others. However, the need for tactical interoperability is obvious but quite controversial. Offensive capabilities in the larger context up to a specific mission area for other domains and disciplines. This breaks the uniform model. Please note that this is excerpt from larger study related to maneuvering and tactics in cyber warfare. It focuses only on elements that can be found in offensive capabilities]]>

This document defines a concept of operations for cyber warfare in targeting, accessing and running operations within allocated information space. Maneuvering offensive operations in such an information space requires a framework to handle operational tasks such as target recognition, payload delivery and execution. The joint requirements such as planning and tasking with other interoperable dimensions make things very difficult without such a framework approach. In the worst case each of the elements is being handled in un-coordinated manner, rendering effects of potential capabilities low and simultaneously possessing a threat for manipulating organizations. Based on the understanding shown, offensive cyber warfare operates quite differently compared to its kinetic counterparts. It creates its own operational theory and models not directly aligned with others. However, the need for tactical interoperability is obvious but quite controversial. Offensive capabilities in the larger context up to a specific mission area for other domains and disciplines. This breaks the uniform model. Please note that this is excerpt from larger study related to maneuvering and tactics in cyber warfare. It focuses only on elements that can be found in offensive capabilities]]>
Tue, 15 Oct 2013 12:23:59 GMT /slideshow/the-elementsofoffensivecyberwarfareoperations2/27213650 mikkoj@slideshare.net(mikkoj) The Elements of Offensive Cyber Warfare Operations mikkoj This document defines a concept of operations for cyber warfare in targeting, accessing and running operations within allocated information space. Maneuvering offensive operations in such an information space requires a framework to handle operational tasks such as target recognition, payload delivery and execution. The joint requirements such as planning and tasking with other interoperable dimensions make things very difficult without such a framework approach. In the worst case each of the elements is being handled in un-coordinated manner, rendering effects of potential capabilities low and simultaneously possessing a threat for manipulating organizations. Based on the understanding shown, offensive cyber warfare operates quite differently compared to its kinetic counterparts. It creates its own operational theory and models not directly aligned with others. However, the need for tactical interoperability is obvious but quite controversial. Offensive capabilities in the larger context up to a specific mission area for other domains and disciplines. This breaks the uniform model. Please note that this is excerpt from larger study related to maneuvering and tactics in cyber warfare. It focuses only on elements that can be found in offensive capabilities <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/the-elements-of-offensive-cyber-warfare-operations2-131015122359-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This document defines a concept of operations for cyber warfare in targeting, accessing and running operations within allocated information space. Maneuvering offensive operations in such an information space requires a framework to handle operational tasks such as target recognition, payload delivery and execution. The joint requirements such as planning and tasking with other interoperable dimensions make things very difficult without such a framework approach. In the worst case each of the elements is being handled in un-coordinated manner, rendering effects of potential capabilities low and simultaneously possessing a threat for manipulating organizations. Based on the understanding shown, offensive cyber warfare operates quite differently compared to its kinetic counterparts. It creates its own operational theory and models not directly aligned with others. However, the need for tactical interoperability is obvious but quite controversial. Offensive capabilities in the larger context up to a specific mission area for other domains and disciplines. This breaks the uniform model. Please note that this is excerpt from larger study related to maneuvering and tactics in cyber warfare. It focuses only on elements that can be found in offensive capabilities
The Elements of Offensive Cyber Warfare Operations from Mikko Jakonen
]]>
1984 6 https://cdn.slidesharecdn.com/ss_thumbnails/the-elements-of-offensive-cyber-warfare-operations2-131015122359-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
IdM, salaus ja cyberspace - Läpinäkyvä käyttäjähallinta ja salaus kyberulottuvuudessa /slideshow/idm-salaus-ja-cyberspace-lpinkyv-kyttjhallinta-ja-salaus-kyberulottuvuudessa/14781612 idmpilvisskyberturvallisuusmikkoj06092012-121018051556-phpapp01
Ubiquitous model for managing role based identities and encryption capabilities within cyberspace ]]>

Ubiquitous model for managing role based identities and encryption capabilities within cyberspace ]]>
Thu, 18 Oct 2012 05:15:54 GMT /slideshow/idm-salaus-ja-cyberspace-lpinkyv-kyttjhallinta-ja-salaus-kyberulottuvuudessa/14781612 mikkoj@slideshare.net(mikkoj) IdM, salaus ja cyberspace - Läpinäkyvä käyttäjähallinta ja salaus kyberulottuvuudessa mikkoj Ubiquitous model for managing role based identities and encryption capabilities within cyberspace <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/idmpilvisskyberturvallisuusmikkoj06092012-121018051556-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Ubiquitous model for managing role based identities and encryption capabilities within cyberspace
IdM, salaus ja cyberspace - Lè¾°pinè¾°kyvè¾° kè¾°yttè¾°jè¾°hallinta ja salaus kyberulottuvuudessa from Mikko Jakonen
]]>
514 2 https://cdn.slidesharecdn.com/ss_thumbnails/idmpilvisskyberturvallisuusmikkoj06092012-121018051556-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
IdM /slideshow/idm-14781597/14781597 idmpilvisskyberturvallisuusmikkoj06092012-121018051435-phpapp01
Ubiquitous model for managing role based identities and encryption capabilities within cyberspace ]]>

Ubiquitous model for managing role based identities and encryption capabilities within cyberspace ]]>
Thu, 18 Oct 2012 05:14:34 GMT /slideshow/idm-14781597/14781597 mikkoj@slideshare.net(mikkoj) IdM mikkoj Ubiquitous model for managing role based identities and encryption capabilities within cyberspace <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/idmpilvisskyberturvallisuusmikkoj06092012-121018051435-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Ubiquitous model for managing role based identities and encryption capabilities within cyberspace
IdM from Mikko Jakonen
]]>
485 3 https://cdn.slidesharecdn.com/ss_thumbnails/idmpilvisskyberturvallisuusmikkoj06092012-121018051435-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Tiedonhallinnan haasteista tietovuotojen estämiseen - Information Assurance - Microsoft Techdays 2010 /slideshow/tiedonhallinnanhaasteista-tietovuotojen-estmiseen-microsoft-techdays-2010/4531077 informationassurancesecproofmicrosofttechdays2010-12768184363977-phpapp02
Tiedonhallinnanhaasteista tietovuotojen estämiseen; Kuinka sinun tulisi ottaa huomioon organisaatiossasi liikkuvan tiedon suojaaminen ja miten toteutat sen hallinnan?]]>

Tiedonhallinnanhaasteista tietovuotojen estämiseen; Kuinka sinun tulisi ottaa huomioon organisaatiossasi liikkuvan tiedon suojaaminen ja miten toteutat sen hallinnan?]]>
Thu, 17 Jun 2010 18:49:00 GMT /slideshow/tiedonhallinnanhaasteista-tietovuotojen-estmiseen-microsoft-techdays-2010/4531077 mikkoj@slideshare.net(mikkoj) Tiedonhallinnan haasteista tietovuotojen estämiseen - Information Assurance - Microsoft Techdays 2010 mikkoj Tiedonhallinnanhaasteista tietovuotojen estämiseen; Kuinka sinun tulisi ottaa huomioon organisaatiossasi liikkuvan tiedon suojaaminen ja miten toteutat sen hallinnan? <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/informationassurancesecproofmicrosofttechdays2010-12768184363977-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Tiedonhallinnanhaasteista tietovuotojen estämiseen; Kuinka sinun tulisi ottaa huomioon organisaatiossasi liikkuvan tiedon suojaaminen ja miten toteutat sen hallinnan?
Tiedonhallinnan haasteista tietovuotojen estè¾°miseen - Information Assurance - Microsoft Techdays 2010 from Mikko Jakonen
]]>
552 3 https://cdn.slidesharecdn.com/ss_thumbnails/informationassurancesecproofmicrosofttechdays2010-12768184363977-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://public.slidesharecdn.com/v2/images/profile-picture.png I am independent technology/security contractor with a vision. - https://cdn.slidesharecdn.com/ss_thumbnails/the-elements-of-offensive-cyber-warfare-operations2-131015122359-phpapp01-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/the-elementsofoffensivecyberwarfareoperations2/27213650 The Elements of Offens... https://cdn.slidesharecdn.com/ss_thumbnails/idmpilvisskyberturvallisuusmikkoj06092012-121018051556-phpapp01-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/idm-salaus-ja-cyberspace-lpinkyv-kyttjhallinta-ja-salaus-kyberulottuvuudessa/14781612 IdM, salaus ja cybersp... https://cdn.slidesharecdn.com/ss_thumbnails/idmpilvisskyberturvallisuusmikkoj06092012-121018051435-phpapp01-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/idm-14781597/14781597 IdM