The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.05 - September/October (2011 vol.9)
pp: 30-35
Raymond C. Parks , Sandia National Laboratories
David P. Duggan , Sandia National Laboratories
ABSTRACT
The principles of kinetic warfare are well documented, but are not always applicable to cyberwarfare. Differences between cyberspace and the real world suggest some additional principles. This article proposes some principles of cyberwarfare. This is not intended to be a comprehensive list but rather suggestions leading toward discussion and dialogue.
CITATION
Raymond C. Parks, David P. Duggan, "Principles of Cyberwarfare", IEEE Security & Privacy, vol.9, no. 5, pp. 30-35, September/October 2011, doi:10.1109/MSP.2011.138
REFERENCES
1. R.C. Parks, and D.P. Duggan, "Principles of Cyberwarfare," Proc. 2001 IEEE Workshop on Information Assurance and Security, IEEE CS Press, 2001; www.dtic.mil/cgi-binGetTRDoc?Location=U2&doc=GetTRDoc.pdf&AD=ADA424310 .
2. D. Kuelh, "From Cyberspace to Cyberpower," Cyberpower and National Security, F.D. Kramer, S.H. Starr, and L. Wentz eds., Potomac Books, 2009.
3. US Dept. of Defense Joint Publication 3-13, "Joint Doctrine for Information Operations,"9 Oct. 1998; www.c4i.orgjp3_13.pdf.
4. T. Tzu, The Art of Strategy, Doubleday, 1988.
5. C. von Clausewitz, Vom Kriege (On War), CreateSpace, 2009.
6. B.H. Liddel-Hart, Strategy, 2nd ed., Plume, 1991.
7. US Dept. of Defense Joint Publication 1, "Doctrine for the Armed Forces of the United States,"14 May 2007; www.dtic.mil/doctrine/new_pubsjp1.pdf.
8. G. Schudel, B. Wood, and R. Parks, "Modeling Behavior of the Cyber-Terrorist," Nat'l Security Forum Int'l Cooperation to Combat Cyber Crime and Terrorism, Hoover Inst. Press, 1999.
9. R. Duggan, "Insider Adversary Model Briefing," DARPA IASET Insider Workshop, DARPA, 2000.
10. S.M. Convertino, L.A. DeMatiei, and T.M. Knierim, "Flying and Fighting in Cyberspace," July 2007; www.au.af.mil/au/awc/awcgate/maxwellmp40.pdf .
11. J.E. Dunn, "Wikileaks DDoS Tool Downloads Grow Rapidly," Network World,10 Dec. 2010; www.networkworld.com/news/2010121010-wikileaks-ddos-tool-downloads-grow.html .
12. J. Meserve, "Sources: Stage Cyber Attack Reveals Vulnerability in Power Grid," CNN, 26 Sept. 2007; http://articles.cnn.com/2007-09-26/uspower.at.risk_1_generator-cyber-attack-electric-infrastructure?_s=PM:US .
13. G.J. Rattray, Strategic Warfare in Cyberspace, MIT Press, 2001.
14. "Georgia Cyberwarfare," Russian Business Network, 9 Aug. 2008; http://rbnexploit.blogspot.com/2008/08rbn-georgia-cyberwarfare.html .
53 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool