Show simple item record

dc.contributor.advisorRowe, Neil C.
dc.contributor.authorWoods, Clinton, M.
dc.dateMarch 2015
dc.date.accessioned2015-05-06T19:18:04Z
dc.date.available2015-05-06T19:18:04Z
dc.date.issued2015-03
dc.identifier.urihttp://hdl.handle.net/10945/45277
dc.descriptionApproved for public release; distribution is unlimiteden_US
dc.description.abstractCyberspace has become an essential component of modern militaries. As this dependency grows, militaries who exploit this dependency may be able to hurt their adversaries within cyberspace to coerce them into a desirable action. This thesis will explore one particular use of cyber coercion, the use of cyber weapons to target supply chains, to study what methods may be best suited for cyber coercion. This thesis first looks at the possibilities for cyber coercion and the various factors that are important for an attack method to successfully coerce an adversary, including reusability, reversibility, and legality. It then proposes various cyber attacks that could be used in cyber coercion and reviews factors important in cyber coercion. Next, it takes these proposed methods and walks through three scenarios against fictional nation-states to analyze how these methods might perform in a cyber-coercion operation. Included are possible effects if these same attacks were used against the United States. Findings are then presented based on the scenarios.en_US
dc.description.urihttp://archive.org/details/implementingcybe1094545277
dc.publisherMonterey, California: Naval Postgraduate Schoolen_US
dc.rightsThis publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.en_US
dc.titleImplementing cyber coercionen_US
dc.typeThesisen_US
dc.contributor.secondreaderDenning, Dorothy E.
dc.contributor.departmentComputer Science
dc.contributor.departmentComputer Scienceen_US
dc.subject.authorcyber coercionen_US
dc.subject.authorcyber warfareen_US
dc.subject.authorcyber policyen_US
dc.description.serviceLieutenant, United States Navyen_US
etd.thesisdegree.nameMaster of Science in Computer Scienceen_US
etd.thesisdegree.levelMastersen_US
etd.thesisdegree.disciplineComputer Scienceen_US
etd.thesisdegree.grantorNaval Postgraduate Schoolen_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record