Strategic operations in the cyber domain and their implications for national cyber security
dc.contributor.author | Herpig, Sven | |
dc.contributor.editor | Cunningham, Douglas W. | |
dc.contributor.editor | Hofstedt, Petra | |
dc.contributor.editor | Meer, Klaus | |
dc.contributor.editor | Schmitt, Ingo | |
dc.date.accessioned | 2017-06-30T08:15:42Z | |
dc.date.available | 2017-06-30T08:15:42Z | |
dc.date.issued | 2015 | |
dc.description.abstract | With the public discussion mainly revolving around deterrence (either by denial or by punishment), there are actually a number of strategies which can be applied to cyber operations. A cyber strategy can be thought of as an umbrella for various individual cyber operations with the ultimate aim to achieve a strategic and / or political goal. Thus, cyber strategies can be defined as the development and employment of cyber operations, integrated and coordinated with other operational domains and forms of information warfare, to achieve or support the achievement of political objectives. Five of those strategies currently exist: going dark, deterrence, sub rosa, shashou jian, and cyber war. The implications of their existence and use create the need for proactive cyber security. | en |
dc.identifier.isbn | 978-3-88579-640-4 | |
dc.identifier.pissn | 1617-5468 | |
dc.language.iso | en | |
dc.publisher | Gesellschaft für Informatik e.V. | |
dc.relation.ispartof | INFORMATIK 2015 | |
dc.relation.ispartofseries | Lecture Notes in Informatics (LNI) - Proceedings, Volume P-246 | |
dc.title | Strategic operations in the cyber domain and their implications for national cyber security | en |
dc.type | Text/Conference Paper | |
gi.citation.endPage | 607 | |
gi.citation.publisherPlace | Bonn | |
gi.citation.startPage | 597 | |
gi.conference.date | 28. September - 2. Oktober 2015 | |
gi.conference.location | Cottbus |
Dateien
Originalbündel
1 - 1 von 1