This Article 
 Bibliographic References 
 Add to: 
Principles of Cyberwarfare
September/October 2011 (vol. 9 no. 5)
pp. 30-35
Raymond C. Parks, Sandia National Laboratories
David P. Duggan, Sandia National Laboratories
The principles of kinetic warfare are well documented, but are not always applicable to cyberwarfare. Differences between cyberspace and the real world suggest some additional principles. This article proposes some principles of cyberwarfare. This is not intended to be a comprehensive list but rather suggestions leading toward discussion and dialogue.

1. R.C. Parks, and D.P. Duggan, "Principles of Cyberwarfare," Proc. 2001 IEEE Workshop on Information Assurance and Security, IEEE CS Press, 2001; .
2. D. Kuelh, "From Cyberspace to Cyberpower," Cyberpower and National Security, F.D. Kramer, S.H. Starr, and L. Wentz eds., Potomac Books, 2009.
3. US Dept. of Defense Joint Publication 3-13, "Joint Doctrine for Information Operations,"9 Oct. 1998; www.c4i.orgjp3_13.pdf.
4. T. Tzu, The Art of Strategy, Doubleday, 1988.
5. C. von Clausewitz, Vom Kriege (On War), CreateSpace, 2009.
6. B.H. Liddel-Hart, Strategy, 2nd ed., Plume, 1991.
7. US Dept. of Defense Joint Publication 1, "Doctrine for the Armed Forces of the United States,"14 May 2007;
8. G. Schudel, B. Wood, and R. Parks, "Modeling Behavior of the Cyber-Terrorist," Nat'l Security Forum Int'l Cooperation to Combat Cyber Crime and Terrorism, Hoover Inst. Press, 1999.
9. R. Duggan, "Insider Adversary Model Briefing," DARPA IASET Insider Workshop, DARPA, 2000.
10. S.M. Convertino, L.A. DeMatiei, and T.M. Knierim, "Flying and Fighting in Cyberspace," July 2007; .
11. J.E. Dunn, "Wikileaks DDoS Tool Downloads Grow Rapidly," Network World,10 Dec. 2010; .
12. J. Meserve, "Sources: Stage Cyber Attack Reveals Vulnerability in Power Grid," CNN, 26 Sept. 2007; .
13. G.J. Rattray, Strategic Warfare in Cyberspace, MIT Press, 2001.
14. "Georgia Cyberwarfare," Russian Business Network, 9 Aug. 2008; .

Raymond C. Parks, David P. Duggan, "Principles of Cyberwarfare," IEEE Security & Privacy, vol. 9, no. 5, pp. 30-35, Sept.-Oct. 2011, doi:10.1109/MSP.2011.138
Usage of this product signifies your acceptance of the Terms of Use.