Establishing Cyber Warfare Doctrine
نویسندگان
چکیده
Over the past several decades, advances in technology have transformed communications and the ability to acquire, disseminate, and utilize information in a range of environments. Modern societies and their respective militaries have taken advantage of a robust information space through networkcentric systems. Because military and commercial operations have increasingly converged, communication and information infrastructures are now high-priority military objectives in times of war. This article examines the theoretical underpinning of current cyber warfare research, what we have learned so far about its application, and some of the emerging themes to be considered; it also postulates the development of a (national) cyber warfare doctrine (CWD). An endeavor of this scale requires lots of considerations and preparation for its development if it is to be cooperatively embraced. This article considers why information technology systems and their supporting infrastructures should be considered legitimate military targets in conflicts, and offers several events that support this supposition. In addition, it identifies the various forms of doctrine that will become the basis for developing a CWD, discusses a CWD's possible components, and proposes a national collaborative and discussion framework for obtaining a nation's stakeholder buy-in for such an endeavor. This article is available in Journal of Strategic Security: http://scholarcommons.usf.edu/jss/vol5/iss1/7 Journal of Strategic Security Volume 5 Issue 1 2012, pp. 31-48 DOI: 10.5038/1944-0472.5.1.3 Journal of Strategic Security (c) 2012 ISSN: 1944-0464 eISSN: 1944-0472 31 Establishing Cyber Warfare Doctrine Andrew Colarik and Lech Janczewski Independent Consultant and University of Auckland
منابع مشابه
China's Emerging Cyber War Doctrine
China will develop much greater depth and sophistication in its understanding and handling of information warfare techniques and operations. With Indian security becoming increasingly dependent on date processing and network centricity, it will become extremely vulnerable to such information warfare campaigns. India needs to adopt a multidisciplinary approach towards dealing with the emerging c...
متن کاملCyber Wars: A Paradigm Shift from Means to Ends
The last couple of decades have seen a colossal change in terms of the influence that computers have on the battle field, to an extent that defence pundits claim it to be a dawn of a new era in warfare. The use of computers and information in defence has manifested into various force multipliers such as Information Operations, C4I2SR Systems, Network Centric Warfare, to the extent that commenta...
متن کاملThe Hierarchy of Cyber War Definitions
With the advent of militaries declaring cyberspace as the fifth domain of military warfare, those modern societies that are heavily dependent on its reli‐ able operation need to have a clear understanding of the actors and future activities brought about by this new doctrine. Knowing what is meant by the terms ‘cyber war’ and ‘cyber warfare’ is critical to navigating a path forward in preparing...
متن کاملAsset Criticality in Mission Reconfigurable Cyber Systems and its Contribution to Key Cyber Terrain
The concept of a common operational picture has been utilized by the military for situational awareness in warfare domains for many years. With the emergence of cyberspace as a domain, there is a necessity to develop doctrine and tools to enable situational awareness for key-decision makers. Our study analyzes key elements that define cyber situational awareness to develop a methodology to iden...
متن کاملExterminating the Cyber Flea: Irregular Warfare Lessons for Cyber Defence
Traditional approaches to tactical Computer Network Defence (CND), drawn from the lessons and doctrine of conventional warfare, are based on a team of deployed security professionals countering the adversary’s cyber forces. The concept of the adversary in cyberspace does not fit neatly into the conventional military paradigms. Rather than fighting an identifiable foe, cyber adversaries are clan...
متن کامل