Computer network operations methodology

dc.contributor.advisorEagle, Chris
dc.contributor.advisorBoger, Dan C.
dc.contributor.authorVega, Juan Carlos
dc.contributor.corporateNaval Postgraduate School
dc.contributor.departmentInformation Sciences (IS)
dc.date.accessioned2012-03-14T17:32:41Z
dc.date.available2012-03-14T17:32:41Z
dc.date.issued2005-09
dc.description.abstractAll nations face increasing tension between exploiting Computer Network Operations (CNO) in the military sphere and protecting the global information grid. The United States is moving apace to develop doctrines and capabilities that will allow them to exploit cyberspace for military advantage. Within the broad rubric of Information Operations, there is increasing effort devoted to integrating CNO into routine military planning. At the same time, these nations are becoming increasingly concerned at the dependency of their militaries, governments, economies and societies on the networked information systems that are emerging as the central nervous systems of post-industrial society. The armed forces desire to exploit and use CNO to their advantage is the central argument for this developed concept. This new weapons platform, or CNO, can be clearly identified so that the leaders will have an understanding of terms, limitations and capabilities of cyber operations. A methodology incorporating doctrine can be created to identify the Rules of Engagement (ROE) as well as the CNO components. The CNO area of operations and area of interest reach far beyond the typical battle space. The battle space has evolved and has penetrated every element of military operations that utilize computers and networks.en_US
dc.description.distributionstatementApproved for public release; distribution is unlimited.
dc.description.serviceCaptain (Promotable), United States Armyen_US
dc.description.urihttp://archive.org/details/computernetworko109451685
dc.format.extentxviii, 89 p. : col. ill. ;en_US
dc.identifier.oclc55115090
dc.identifier.urihttps://hdl.handle.net/10945/1685
dc.publisherMonterey California. Naval Postgraduate Schoolen_US
dc.rightsThis publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.en_US
dc.subject.lcshMilitary planningen_US
dc.subject.lcshComputer networksen_US
dc.subject.lcshTechnologyen_US
dc.subject.lcshManagementen_US
dc.subject.lcshCyberterrorismen_US
dc.titleComputer network operations methodologyen_US
dc.typeThesisen_US
dspace.entity.typePublication
etd.thesisdegree.disciplineInformation Technology Managementen_US
etd.thesisdegree.grantorNaval Postgraduate Schoolen_US
etd.thesisdegree.levelMastersen_US
etd.thesisdegree.nameM.S. in Information Technology Managementen_US
etd.verifiednoen_US
Files
Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
04Mar_Vega.pdf
Size:
1.19 MB
Format:
Adobe Portable Document Format
Collections