Integrated cyber defenses towards cyber defense doctrine

Download
Author
Cloud, Donald W.
Date
2007-12Advisor
Moran, Daniel
Denning, Dorothy
Metadata
Show full item recordAbstract
At the same time that the Department of Defense (DoD) has leveraged Network Centric Warfare concepts to increase the operational effectiveness of U.S. military forces and to gain decision superiority over adversaries, the DoD has become increasingly dependent upon the secure operations of computer networks and infrastructure. As a result, DoD computer network operations have become a vital center of gravity of U.S. military forces. Unfortunately, computer networks are growing faster than the DoD can defend them, while cyber attack sophistication and numbers of attacks continue to rise. In addition, many nation states have begun to invest in developing real cyber warfare capabilities. Therefore, it is critical to U.S. military operations that the DoD has the capability to defend its own networks against aggressive adversaries. Alarmingly, the DoD currently does not have a formal foundation for Computer Network Defense doctrine. All existing doctrine and regulations focus on computer and network security and not warfare. Another challenge in the development of effective doctrine with respect to cyber warfare is that we have little real historical experience of conducting it. However by leveraging the similarities of the air warfighting domain to that of the warfighting domain of cyberspace, this thesis will extrapolate historical doctrinal lessons regarding defensive air power doctrine to build a foundation for the development of Computer Network Defense doctrine.
Collections
Related items
Showing items related by title, author, creator and subject.
-
Enterprise implementations of wireless network technologies at the Naval Postgraduate School and other military educational institutions
Roth, Joseph L. (Monterey, California. Naval Postgraduate School, 2002-09);The purpose of all information systems is to assist people in transitioning data into information, and then information into knowledge. In order to reach IT modernity, three things need to occur: a convergence of single ... -
Naval doctrine: an analysis of the effectiveness of NDP 1 and NDP 6
Westerfield, Anne Laura (Monterey, California. Naval Postgraduate School, 1996-06);The purpose of doctrine is to unite beliefs and actions. The Armed Forces are not always successful in achieving true interoperability; one cause for the disconnection between them is that, while the Services develop forces, ... -
Developing a reliable methodology for assessing the computer network operations threat of North Korea
Brown, Christopher (Monterey, California. Naval Postgraduate School, 2004-09);Computer network operations (CNO) can be considered a relatively new phenomenon being encount modern warfare. Computer network operation is comprised of three components, computer network attack computer network exploitation ...