Abstract
Improving ICT infrastructure, dramatic increase in internet usage and increasing dependence on networks have carried with cyber risks and threats. Complex, shape shifting and emerging risks and threats have systematically paved the way for cyberspace to emerge as a new domain after land, air, maritime and space. It is obvious enough that cyber threats probably continue to take part in global cyber theatre for years. However, it is sometimes hard to pinpoint at first a specific axis of cyber threats; they are generally varied merely from a simple computer code to systematic cyber strikes like targeted cyber attacks, cyber terrorism and industrial espionage activities. Due to the exponential use of cyberspace and the complex nature of cyber attacks, along with the multivariable cost they cause, it becomes a requirement for operation planners to handle cyber operations and the problems in this sphere in an operational design process. In this study, we tried to handle cyber operations in operational design process in order to comprehend, visualize and enlighten complex cyber incidents holistically and present preventive and systematic approaches by proposing a cyber operational design model. By presenting such model, we aim to help operation planners understand the complexity of cyber operations, show the advantage of using factor and center of gravity analysis (COG) that is generally handled in military decision making process (MDMP) and finally help the technical personnel to have an understanding of operational planning. With the cyber operational design presented as a sample in this study, we plan to provide the commanders with a comprehensive approach in cyber operations.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: International Journal of Cyber-Security and Digital Forensics
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.