Tools and Technologies for Professional Offensive Cyber Operations

نویسنده

  • Tim J. Grant
چکیده

Since 2008, several countries have published new national cyber security strategies that allow for the possibility of offensive cyber operations. Typically, national strategies call for the establishment of a cyber operations unit capable of computer network defence, exploitation, and, in some nations, attack. The cyber operations unit will be manned by professionals and operate under government authority compliant with national and international law. Our research focuses on offensive cyber operations (i.e. computer network exploitation and attack). The cyber unit must be provided with the right resources, in the form of accommodation, computing and networking infrastructure, tools and technologies, doctrine, and training. We contend that the open literature gives an unbalanced view of what tools and technologies a professional group needs because it emphasizes malware and, to a lesser extent, the delivery media used by cyber criminals. Hence, the purpose of this paper is to identify systematically the tools and technologies needed for professional, offensive cyber operations. A canonical model of the cyber attack process was obtained by rationally reconstructing a set of existing attack process models found in the literature. This canonical model was formalized using Structured Analysis and Design Technique (SADT) notation, in which processes are logically linked by inputs, outputs, controls, and mechanisms. A set of tools and technologies was extracted from the mechanisms. The canonical model and set of tools and technologies have been checked by subject matter experts. Tools and Technologies for Professional Offensive Cyber Operations

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Advanced Tools for Cyber Ranges

In response to the growing number and variety of cyber threats, the government, military, and industry are widely employing network emulation environments for cyber capability testing and cyber warfare training. These “cyber ranges” have been increasing in size and complexity to model the high-volume network traffic and sophisticated attacks seen on the Internet today. For cyber ranges to opera...

متن کامل

Towards a Cognitive System for Decision Support in Cyber Operations

This paper presents the general requirements to build a “cognitive system for decision support”, capable of simulating defensive and offensive cyber operations. We aim to identify the key processes that mediate interactions between defenders, adversaries and the public, focusing on cognitive and ontological factors. We describe a controlled experimental phase where the system performance is ass...

متن کامل

Assessing Performance in an Innovative Cybersecurity Pilot Course

In 2014, 25% of all organizations polled across industry said the lack of infosec skills were a problem. In 2015, an Enterprise Strategy Group (ESG) survey found that 28% reported a shortage of infosec skills (Trendmicro, 2015). With the growing threat of cybercrime and national security issues, growing the number of qualified cybersecurity professionals has become a national imperative. As the...

متن کامل

Modeling and Integrating Cognitive Agents Within the Emerging Cyber Domain

One of the elements missing from virtual environments in the emerging cyber domain is an element of active opposition. For example, in a training simulation the instructor assigns the student a task or objective, and the student then practices within the environment (the “cyber range”) until they feel comfortable with the task or are able to demonstrate the requisite level of mastery. The envir...

متن کامل

Implementing Lean Tools to Streamline Banking Operations: A Case Study of a Small Lebanese Bank

The purpose of this paper is to discuss the benefits generated from the application of lean tools in banking services. We will highlight on challenges, advantages, and principal success factors for lean implementation. As financial markets are experiencing changes so it’s mandatory to create a streamlined bank to meet the new expectations in a timely manner while continuing to lower operational...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IJCWT

دوره 3  شماره 

صفحات  -

تاریخ انتشار 2013