首页> 外文会议>International Conference on Cyber Warfare and Security >War in 1s and Os: Framing the Lexicon for the Digital age
【24h】

War in 1s and Os: Framing the Lexicon for the Digital age

机译:在1S和OS中的战争:框架莱克西森为数字时代

获取原文

摘要

This paper is written for military Commanders, planners, and practitioners. It attempts to place the discussion of cyberwarfare in terms more familiar to them. Presenting the concepts in these common terms provides for an accessible discussion on the usage of cyber capabilities in support of national/military ends, while drawing distinctions between conventional operations and their cyber counterparts. The intent in the work is to demystify cyber-means for military professionals while demonstrating its operational relevance and considerations associated with their employment. The focus has been placed not on discovery of a new approach or depicting the flaws in a given theory, but on drawing attention to the operational relevancy of cyber capabilities by placing them in terms of conventional operations and operational design. Ideally, by describing functional parallels between traditional military operations and cyber activities, baseline considerations may be drawn that support a more informed discussion of strategy in the information age. Moreover, discussing cyber capabilities in an operational context should assist in identifying opportunities for employment, leading to the operationalization of cyber capabilities, and making those capabilities applicable to more than Combatant Commanders. The paper relates cyber considerations in terms of Defend, Reinforce, Attack, Withdraw, Delay, and Employ Restricted Capabilities (DRAW-DE), making the topic more broadly relevant to military practitioners. While network defense operations carry their own level of specific considerations, an inability to discuss network considerations in terms of traditional military operations has created some difficulties in planning and execution. By framing network operations in terms of their effects vis-à-vis traditional military operations, and then identifying the underlying concepts that restrict their use, the intent is to place the field of study in accessible terms. By placing network operations in accessible terms, they should be more broadly embraced as operationally relevant to Commanders and planners alike, and their considerations will be more easily folded into traditional actions. The article is based on studies conducted at the Anthony G. Oettinger School at NIU, and founded on years of experience in matters appropriate to the field of study. The views expressed do not reflect the official policy or position of the National Intelligence University, the Department of Defense, the U.S. Intelligence Community, or the U.S. Government.
机译:本文是为军事指挥官,规划者和从业者编写的。它试图在对他们更熟悉的条款中讨论Cyber​​warfare。在这些共同术语中提出概念,提供了有关支持国家/军事目的支持的网络能力的可访问讨论,同时在传统运营和网络对应物之间绘制区别。在工作中的意图是为军事专业人员揭开网络手段,同时证明其运作相关性和与他们就业相关的考虑。焦点未被发现在发现新方法或描绘给定理论中的缺陷,而是通过将关注传统操作和操作设计来引起网络能力的操作相关性。理想情况下,通过描述传统军事行动和网络活动之间的功能平行,可以绘制基线考虑,支持在信息时代的策略中提供更明智的讨论。此外,在运营背景下讨论网络能力应协助确定就业机会,导致网络能力的运作,并使这些能力适用于比战斗指挥官的更多。本文涉及捍卫,加强,攻击,撤销,延误和雇用限制性能力(Law-de)方面的网络考虑,使得与军事从业人员更广泛地相关。虽然网络防御业务携带自己的具体考虑水平,但无法讨论传统军事行动方面的网络考虑因素在规划和执行方面创造了一些困难。通过框架网络运营,在其效果中,传统的军事行动,然后识别限制其使用的潜在概念,意图是将学习领域放在可访问的条件下。通过将网络运营以可访问的条件放置,应更广泛地接受与指挥官和规划者相似的操作,并且他们的考虑将更容易折叠成传统行动。本文基于NIU的Anthony G. Oettinger学校进行的研究,并在适合学习领域的问题上创立了多年的经验。表达的观点并无反映国家情报大学,国防部,美国情报界或美国政府的官方政策或地位。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号