首页> 外文会议>International Conference on Cyber Conflict >Establishing volunteer US cyber defense units: A holistic approach
【24h】

Establishing volunteer US cyber defense units: A holistic approach

机译:建立志愿者美国网络国防单位:全面的方法

获取原文

摘要

The global use of the cyber domain has heightened speed, agility, and interconnectivity within our societies. Consequently, it has also increased threats that share the same characteristics. No longer is reality linear, as two points in time and individuals can connect from varied locations almost instantly, shifting the balance of how we approach traditional security challenges. This paper argues for the creation of volunteer United States (US) Cyber Defense Units (US CDU) at the state-level, similar to the Estonian Defence League's Cyber Defence Unit (EDL CDU). The goal in its establishment being to achieve a whole-of-society approach by creating the opportunity for individuals across sectors to volunteer in the joint cause of protecting US cyberspace. Voluntarism has worked before (e.g. US Minutemen, US National Guard, Civil Air Patrol) and it can certainly work again - this time, for the cyber domain. This paper provides background on prior US cyber defense initiatives and delves into the EDL CDU to draw possible theoretical structures and lessons for the formation and integration of the proposed US CDU. It also examines ongoing developments with the US Cyber Mission Force (CMF) to compare efforts. The paper includes primary and secondary source material from academia, government, and private sectors in both the US and Estonia. It analyzes ongoing efforts for cyber defense and reviews academic literature and research on the topics discussed.
机译:网络域的全球使用速度,敏捷性和社会内的互连。因此,它还增加了共享相同特征的威胁。不再是现实线性,因为两点在时间和个人中可以几乎立即从各种各样的位置连接,转移我们如何接近传统安全挑战的平衡。本文在国家级创建志愿者美国(美国)网络国防单位(美国CDU),类似于爱沙尼亚国防联盟的网络防御单位(EDL CDU)。其成立的目标是通过为跨部门的个人创造机会来实现全部社会方法,以志愿者在保护美国网络空间的联合原因中。志愿者派在之前(例如,美国Minutemen,美国国民卫队,民航巡逻),它肯定可以再次工作 - 这次是网络域。本文提供了先前美国网络防御计划的背景,并将其进入EDL CDU,以绘制所提出的美国CDU的形成和整合的理论结构和课程。它还探讨了与美国网络使命力(CMF)的持续发展,以比较努力。本文包括来自美国和爱沙尼亚的学术界,政府和私营部门的主要和二级源材料。它分析了网络防守的持续努力,并审查了讨论的主题的学术文学和研究。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号