A term the US Department of Defense uses to describe computer network attack, defense, and other exploitation-enabling operations. Computer network operations are used in electronic warfare to disrupt or entirely disable an enemy’s command and control while protecting yourself and your allies from similar attacks.
Computer network attack. Disrupting the flow of information on computer networks or destroying it and/or the computer networks themselves.
Computer network defense. Actions that are done to protect information systems and networks, like monitoring, analyzing, detecting, and responding to threats to the network.
Computer network exploitation. Data theft via computer networks used for espionage.