Cyber Warfare Simulation to Prepare to Control Cyber Space

نویسندگان

  • Martin R. Stytz
  • Sheila B. Banks
چکیده

ccurate simulation of cyber warfare can prepare decision-makers for its challenges. With cyber warfare, it is possible to control an adversaries’ information, target the portions of cyber space used for situational awareness and decision-making, lead the adversary to make desired decisions, and strike directly at the opposition’s mind. A cyber attack diminishes individual and group situational awareness and command and control by undermining one or more elements of cyberspace. The cyber space threat is magnified by the technologies of the network centric warfare (NCW) paradigm. The vulnerabilities exploited by cyber warfare are inherent to NCW technologies. Due to the importance of cyber space to success in warfare, proper assessment of real-world and cyber circumstances must be trained via exposure to simulated cyber attacks. To simulate a cyber attack, we need only alter the information presented to the decision-makers. Appropriately configured simulation environments can be used to develop expertise in dealing with cyber warfare and provide an environment for the development of cyber warfare strategies and tactics. In the paper, we discuss the effects of cyber attacks upon individual and group situational awareness and an approach to cyber warfare simulation. A CYBER WARFARE SIMULATION TO PREPARE TO

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cyber Wars: A Paradigm Shift from Means to Ends

The last couple of decades have seen a colossal change in terms of the influence that computers have on the battle field, to an extent that defence pundits claim it to be a dawn of a new era in warfare. The use of computers and information in defence has manifested into various force multipliers such as Information Operations, C4I2SR Systems, Network Centric Warfare, to the extent that commenta...

متن کامل

Characteristics of an Islamic View of Cyber-Ethics

The current Cyber-ethics in Western societies (and its followers in other societies) have been compiled based on secularist presupposition. This presupposition has different principles in comparison with the Islamic attitude which can lead one to take a different approach toward ethical problems. This paper is an attempt to propose principles of Islamic cyber-ethics upon which we can prepare an...

متن کامل

On Cyber Warfare Command and Control Systems

As Defense agencies and services expand their reliance on computer networks, risk to information availability and integrity increases. It is no longer adequate to rely solely on the now traditional defense-in-depth strategy. We must recognize that we are engaged in a form of warfare, cyber warfare, and deploy our resources using the strategy and tactics of warfare. Most Defense organizations ha...

متن کامل

Sociological Investigation of the Usage of Cyber Space and its Relation with Social Isolation (Case Study: Science and Research Branch Students)

The development and improvement of electronic communication instruments and means in postmodern societies with fast intention has caused further multiplication in meanings and content of the communication itself. On the other hand the involvement of cyber space in our privacy has caused massive personality changes in people particularly the youth, In a way that individuals are separated from re...

متن کامل

Cyber War Games: Strategic Jostling Among Traditional Adversaries

Cyber warfare has been simmering for a long time and has gradually morphed into a key strategic weapon in international conflicts. Doctrines of several countries consider cyber warfare capability as essential to gain strategic superiority or as a counterbalance to military inferiority. Countries are attempting to reach consensus on confidence building measures in cyber space while racing with e...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013