Establishing Cyber Warfare Doctrine

نویسندگان

  • Andrew M. Colarik
  • Andrew Colarik
چکیده

Over the past several decades, advances in technology have transformed communications and the ability to acquire, disseminate, and utilize information in a range of environments. Modern societies and their respective militaries have taken advantage of a robust information space through networkcentric systems. Because military and commercial operations have increasingly converged, communication and information infrastructures are now high-priority military objectives in times of war. This article examines the theoretical underpinning of current cyber warfare research, what we have learned so far about its application, and some of the emerging themes to be considered; it also postulates the development of a (national) cyber warfare doctrine (CWD). An endeavor of this scale requires lots of considerations and preparation for its development if it is to be cooperatively embraced. This article considers why information technology systems and their supporting infrastructures should be considered legitimate military targets in conflicts, and offers several events that support this supposition. In addition, it identifies the various forms of doctrine that will become the basis for developing a CWD, discusses a CWD's possible components, and proposes a national collaborative and discussion framework for obtaining a nation's stakeholder buy-in for such an endeavor. This article is available in Journal of Strategic Security: http://scholarcommons.usf.edu/jss/vol5/iss1/7 Journal of Strategic Security Volume 5 Issue 1 2012, pp. 31-48 DOI: 10.5038/1944-0472.5.1.3 Journal of Strategic Security (c) 2012 ISSN: 1944-0464 eISSN: 1944-0472 31 Establishing Cyber Warfare Doctrine Andrew Colarik and Lech Janczewski Independent Consultant and University of Auckland

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

China's Emerging Cyber War Doctrine

China will develop much greater depth and sophistication in its understanding and handling of information warfare techniques and operations. With Indian security becoming increasingly dependent on date processing and network centricity, it will become extremely vulnerable to such information warfare campaigns. India needs to adopt a multidisciplinary approach towards dealing with the emerging c...

متن کامل

Cyber Wars: A Paradigm Shift from Means to Ends

The last couple of decades have seen a colossal change in terms of the influence that computers have on the battle field, to an extent that defence pundits claim it to be a dawn of a new era in warfare. The use of computers and information in defence has manifested into various force multipliers such as Information Operations, C4I2SR Systems, Network Centric Warfare, to the extent that commenta...

متن کامل

The Hierarchy of Cyber War Definitions

With the advent of militaries declaring cyberspace as the fifth domain of military warfare, those modern societies that are heavily dependent on its reli‐ able operation need to have a clear understanding of the actors and future activities brought about by this new doctrine. Knowing what is meant by the terms ‘cyber war’ and ‘cyber warfare’ is critical to navigating a path forward in preparing...

متن کامل

Asset Criticality in Mission Reconfigurable Cyber Systems and its Contribution to Key Cyber Terrain

The concept of a common operational picture has been utilized by the military for situational awareness in warfare domains for many years. With the emergence of cyberspace as a domain, there is a necessity to develop doctrine and tools to enable situational awareness for key-decision makers. Our study analyzes key elements that define cyber situational awareness to develop a methodology to iden...

متن کامل

Exterminating the Cyber Flea: Irregular Warfare Lessons for Cyber Defence

Traditional approaches to tactical Computer Network Defence (CND), drawn from the lessons and doctrine of conventional warfare, are based on a team of deployed security professionals countering the adversary’s cyber forces. The concept of the adversary in cyberspace does not fit neatly into the conventional military paradigms. Rather than fighting an identifiable foe, cyber adversaries are clan...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013