Computers and networks have provided for increased connectivity, ease of use and convenience. Other advantages include the ability to communicate across borders, have access to information at your fingertips and the huge capacity for storage and transport. However, there also arises the need to properly protect these vital resources. At a computer security level, there exists the underworld community of hackers and crackers who seek to cause damage. From a military point of view, offensive actions are part of the warfare mode of operation. Thus, the attack, together with the protection of information, can take place for various reasons ranging from recreational pastimes, to skilful challenges, as well as military requirements. Networks and cyberspace have become the battleground as attacks are launched to disrupt, destroy or deny access to valuable resources. Network Warfare can thus be seen as the branch of Information Warfare that deals with the utlisation of Information and Communication Technology (ICT) to carry out various exploits of information, as well as the various defensive mechanisms that are deployed in order protect information against attack. Individual users and organisations need to be warned about the latest face of warfare that is not only being played out in the military networks, but also on the Internet and cyberspace. Consequently, Network Warfare has various facets which are often difficult to distinguish between. This paper builds on the field of Network Warfare and contains the motivation for determining a Network Warfare Capability. The motivation and requirements for determining a Network Warfare Capability are explored in this paper. This helps to recognise important considerations for determining a Network Warfare Capability. Some of the requirements are intricate and required further discussion. The extended discussion served to describe some of the requirements in greater detail. A noteworthy requirement of portraying offensive and defensive techniques is elaborated on through the use of UML diagrams. This paper, thus describes the importance of determining a Network Warfare Capability and serves as an introduction to future work in which a model to determine a Network Warfare Capability is proposed. [ABSTRACT FROM AUTHOR]