Resiliency in Future Cyber Combat

نویسنده

  • William D. Bryant
چکیده

Rigid cyberspace defenses are proving unable to meet advanced and modern cyberspace threats. As a result, there has been increasing focus and interest in cyber resiliency, but what will it take to be resilient in future cyber combat? We can glean some useful concepts from the ancient Japanese proverb about the resiliency of bamboo in a storm. In comparison with the massive oak, which relies on structural strength, three characteristics enable the bamboo’s greater resiliency. Bamboo has the ability to accept deformation without failure and a significantly reduced attack surface, and it dynamically reacts to the wind in a way that minimizes the impact of future gusts. Defenders of cyberspace should look to add similar characteristics to their cyberspace systems. First, cyberspace defenders should maximize the flexibility of their systems by deliberately building in “inefficient” excess capacity, planning for and expecting failure, and creating personnel flexibility through training and exercises. Second, defenders should reduce their attack surface by eliminating unnecessary capability in both hardware and software, resist users’ desire for continual rapid improvements in capability without adequate security testing, and segment their networks and systems into separate defended enclaves. Finally, cyber defenders should position themselves to dynamically respond to attacks through improved situational awareness, effective cyberspace command and control, and Col William D. Bryant is a career fighter pilot and strategist with a PhD in military strategy from the School of Advanced Air and Space Studies. He has served in numerous operational and staff assignments and is currently the deputy director of Task Force Cyber Secure on the Air Staff. His recently published book is titled International Conflict and Cyberspace Superiority: Theory and Practice (New York: Routledge, 2015).

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cyber Resiliency Engineering Overview of the Architectural Assessment Process

With the growing capability, expertise and intent of advanced cyber adversaries, it is no longer realistic to assume that one can successfully keep all adversaries out of a system infrastructure. Therefore, architecture and systems engineering must be based on the assumption that systems or components have been or can be compromised, and that missions and business functions must continue to ope...

متن کامل

Analyzing Resiliency of the Smart Grid Communication Architectures under Cyber Attack

Smart grids are susceptible to cyber-attack as a result of new communication, control and computation techniques employed in the grid. In this paper, we characterize and analyze the resiliency of smart grid communication architecture, specifically an RF mesh based architecture, under cyber attacks. We analyze the resiliency of the communication architecture by studying the performance of high-l...

متن کامل

Cyber Threat Indications & Warning: Predict, Identify and Counter

Crime has typically converged with aspects of warfare. This symbiotic relationship further complicates the broad battle-space understanding for early warning vigilance or defensive and offensive maneuvers against nebulous networks and masked relationships of convenience or ideology. The asymmetric cyber domain platform as an adversary’s tool to combat a foe unconventionally in a criminal, haras...

متن کامل

Resiliency Techniques for Systems-of-Systems

The views, opinions and/or findings contained in this report are those of The MITRE Corporation and should not be construed as an official government position, policy, or decision, unless designated by other documentation. Abstract This white paper describes how resiliency techniques apply to an acknowledged system-of-systems (SoS). MITRE's cyber resiliency engineering framework is extended, to...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015