Simple Browser : Welcome guest : log in
Home |  Graph |  ]  KB:  Language:   

Formal Language: 



KB Term: 

  InformationOperation

Sigma KEE - InformationOperation
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
InformationOperation
Actions taken to affect adversary information and information systems while defending one's own information and information systems. Also called IO. See also defensive information operations, information, offensive information operations, operation.
Relationships      
Parents MilitaryOperation A MilitaryOperation is distinguished from the broader class of MilitaryProcess in that it is planned in advance.
Children DefensiveInformationOperationThe integration and coordination of policies and procedures, operations, personnel, and technology to protect and defend information and information systems. Defensive information operations are conducted through information assurance, physical security, operations security, counter-deception, counter-psychological operations, counterintelligence, electronic warfare, and special information operations. Defensive information operations ensure timely, accurate, and relevant information access while denying adversaries the opportunity to exploit friendly information and information systems for their own purposes. See also counterintelligence, electronic warfare, information assurance, information operations, information system, offensive information operations, operations security; physical security, special information operations.
 OffensiveInformationOperationThe integrated use of assigned and supporting capabilities and activities, mutually supported by intelligence, to affect adversary decision makers to achieve or promote specific objectives. These capabilities and activities include but are not limited to operations security, military deception, psychological operations, electronic warfare, physical attack and/or destruction, and special information operations, and could also include computer network attack. See also computer network attack, defensive information operations, electronic warfare, information operations, intelligence, military deception, operations security, psychological operations, special information operations.


Show full definition (without tree view)
Show full definition (with tree view)

Show without tree


Sigma web home      Suggested Upper Merged Ontology (SUMO) web home
Sigma version 3.0 is open source software produced by Articulate Software and its partners