Cyber - Offensive Cyber Attacks
In: Marine corps gazette: the Marine Corps Association newsletter, Band 98, Heft 3, S. 51-54
ISSN: 0025-3170
264 Ergebnisse
Sortierung:
In: Marine corps gazette: the Marine Corps Association newsletter, Band 98, Heft 3, S. 51-54
ISSN: 0025-3170
Cyber-warfare is often discussed, but rarely truly seen. When does an intrusion turn into an attack, and what does that entail? How do nations fold offensive cyber operations into their strategies? Operations against networks mostly occur to collect intelligence, in peacetime. Understanding the lifecycle and complexity of targeting adversary networks is key to doing so effectively in conflict. Rather than discussing the spectre of cyber war, Daniel Moore seeks to observe the spectrum of cyber operations. By piecing together operational case studies, military strategy and technical analysis, he shows that modern cyber operations are neither altogether unique, nor entirely novel. Offensive cyber operations are the latest incarnation of intangible warfare–conflict waged through non-physical means, such as the information space or the electromagnetic spectrum. Not all offensive operations are created equal. Some are slow-paced, clandestine infiltrations requiring discipline and patience for a big payoff; others are short-lived attacks meant to create temporary tactical disruptions. This book first seeks to understand the possibilities, before turning to look at some of the most prolific actors: the United States, Russia, China and Iran. Each has their own unique take, advantages and challenges when attacking networks for effect.
World Affairs Online
In: Oxford scholarship online
In: Political Science
Cyber-warfare is often discussed, but rarely truly seen. When does an intrusion turn into an attack, and what does that entail? How do nations fold offensive cyber operations into their strategies? Operations against networks mostly occur to collect intelligence, in peacetime. Understanding the lifecycle and complexity of targeting adversary networks is key to doing so effectively in conflict. Rather than discussing the spectre of cyber war, Daniel Moore seeks to observe the spectrum of cyber operations. By piecing together operational case studies, military strategy and technical analysis, he shows that modern cyber operations are neither altogether unique, nor entirely novel.
In: Strategic comments: in depth analysis of strategic issues from the International Institute for Strategic Studies, Band 25, Heft 10, S. x-xii
ISSN: 1356-7888
In: International studies review, Band 25, Heft 1
ISSN: 1468-2486
In: International affairs, Band 99, Heft 3, S. 1332-1333
ISSN: 1468-2346
In: The RUSI journal: publication of the Royal United Services Institute for Defence and Security Studies, Band 167, Heft 4/5, S. 148-149
World Affairs Online
In: The journal of strategic studies, Band 36, Heft 1, S. 120-124
ISSN: 1743-937X
In: The journal of strategic studies, Band 36, Heft 1, S. 120-124
ISSN: 0140-2390
In: International journal of cyber warfare and terrorism: IJCWT ; an official publication of the Information Resources Management Association, Band 3, Heft 3, S. 49-71
ISSN: 1947-3443
Since 2008, several countries have published new national cyber security strategies that allow for the possibility of offensive cyber operations. Typically, national strategies call for the establishment of a cyber operations unit capable of computer network defence, exploitation, and, in some nations, attack. The cyber operations unit will be manned by professionals and operate under government authority compliant with national and international law. Our research focuses on offensive cyber operations (i.e. computer network exploitation and attack). The cyber unit must be provided with the right resources, in the form of accommodation, computing and networking infrastructure, tools and technologies, doctrine, and training. We contend that the open literature gives an unbalanced view of what tools and technologies a professional group needs because it emphasizes malware and, to a lesser extent, the delivery media used by cyber criminals. Hence, the purpose of this paper is to identify systematically the tools and technologies needed for professional, offensive cyber operations. A canonical model of the cyber attack process was obtained by rationally reconstructing a set of existing attack process models found in the literature. This canonical model was formalized using Structured Analysis and Design Technique (SADT) notation, in which processes are logically linked by inputs, outputs, controls, and mechanisms. A set of tools and technologies was extracted from the mechanisms. The canonical model and set of tools and technologies have been checked by subject matter experts.
SSRN
Working paper
SSRN
Working paper
In: Jane's defence weekly: JDW, S. 12-13
ISSN: 0265-3818
In: Defence studies, Band 18, Heft 4, S. 395-410
ISSN: 1743-9698
In: Survival: global politics and strategy, Band 59, Heft 1, S. 103-134
ISSN: 1468-2699