2020 12th International Conference on Cyber Conflict (CyCon) 2020
DOI: 10.23919/cycon49761.2020.9131733
|View full text |Cite
|
Sign up to set email alerts
|

Cyber in War: Assessing the Strategic, Tactical, and Operational Utility of Military Cyber Operations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0
2

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 12 publications
(8 citation statements)
references
References 10 publications
0
6
0
2
Order By: Relevance
“…At the current point in time in the history of cyber security politics the empirical picture is characterized by "dogs that did not bark" at the high end of conflict and persistent cyber operations and instability at the low end of conflict (Schulze 2020;Harknett and Smeets 2020;Lupovici 2021). Within this context, the chapters in this volume point to three interconnected aspects of the enduring debate about the strategic utility of cyber operations: A first subsection concentrates on the difficulty of achieving a controlled strategic effect under multidimensional uncertainty.…”
Section: The Strategic Utility Of Cyber Operationsmentioning
confidence: 99%
“…At the current point in time in the history of cyber security politics the empirical picture is characterized by "dogs that did not bark" at the high end of conflict and persistent cyber operations and instability at the low end of conflict (Schulze 2020;Harknett and Smeets 2020;Lupovici 2021). Within this context, the chapters in this volume point to three interconnected aspects of the enduring debate about the strategic utility of cyber operations: A first subsection concentrates on the difficulty of achieving a controlled strategic effect under multidimensional uncertainty.…”
Section: The Strategic Utility Of Cyber Operationsmentioning
confidence: 99%
“…Békeidőben ezek a támadások az alapvető struktúrák, például a kritikus infrastruktúrák ellen irányulnak, de magukban foglalják az amerikai stratégiai koncepcióból ismert "előretolt védelmet" (defend forward), a harctér felderítő-előkészítését, az elrettentést és a kényszerítő (coercion) diplomáciai intézkedéseket is. 17 A hadműveleti szinten az egyes katonai műveletek tervezését és vezetését végzik, tehát a csapatok különböző hadszíntereken történő alkalmazásának kérdéseivel foglalkoznak. Ezen a szinten a katonai műveletek elsősorban katonai célpontok ellen irányulnak.…”
Section: Kiberképességek a Különböző Vezetési Szinteken -Elméleti Ala...unclassified
“…Operational complexity describes how hard it is to pull off the entire operation. Operational complexity includes various aspects such as the number of targets (one system vs. hundreds of systems to be hit at the same time), the defense level of the targets (multiple open attack surfaces vs. air-gapped systems), the availability of resources (intelligence and malware stockpile) as well as the size and internal organization and coordination of attacker teams" [27].…”
Section: Active Defense Vs Cyberwarfarementioning
confidence: 99%