The best way to approach a target point in cyberspace has often been challenged solving complexity such as network weakness, accessibility, time efficiency, and concealment. Therefore, there is a need for techniques to classify, automate, and optimize various operational elements belonging to the three layers of cyberspace necessary for approach. If the policy-making technique used by the military is applied, optimization can be used for the quantification and determination of the best decision-making process to approach the objective. Thus, in this study, cyber operations elements will be classified according to the 5W1H method for cyber-attack and defense training. Then, we propose the way of establishing course of action (COA) through quantifying and evaluating each category of 5W1H and prioritizing it. The effectiveness was analyzed by applying the extracted COA to a famous cyber-attack case, and the factors that had the greatest influence could be extracted. This purpose of this study is to be helpful in establishing the best cyber operational COA when conducting cyber-attack and defense training.
INDEX TERMSCyber warfare, Cyberspace, Cyber operation, Course of action, 5W1H method I. INTRODUCTION JCOPP(Joint Cyber Operational Planning Process) 2. Mission Analysis 3. COA Development 4. COA Analysis 5.