Key terrain: application to the layers of cyberspace
Pantin, Nicholas T.
MetadataShow full item record
The concept of key terrain is a common fixture in military strategy and tactics. The emergence of cyberspace, with characteristics unseen in any warfighting domain, challenge the concept's value. This work is a conceptual analysis that examines the applicability of key terrain in the cyber domain. To determine if key terrain applies in cyberspace, we examine key terrain in traditional physical warfighting domains to understand the concept and draw comparisons. Each of the three layers of cyberspace is examined to determine if the concept of key terrain applies and to identify challenges presented when applying the concept. The result of this work finds key terrain to hold value and applicability within cyberspace. Key terrain can be found at each layer of cyberspace but with some considerations. Cyber key terrain requires constant reassessment, exists only under certain conditions, and can present difficulties in terms of measuring seizure and retention of terrain in cyberspace. The conclusion additionally finds that while cyberspace is unique, it does not require a cyber-specific key terrain definition. We recommend that changes be made to future doctrine, institutional education, and leader development in an effort to provide clarity when using traditional military concepts such as key terrain in cyberspace.
Approved for public release; distribution is unlimited
Showing items related by title, author, creator and subject.
Rowe, Neil C.; Custy, E. John (2007);Cyberspace, computers and networks, is now potential terrain of warfare. We describe some effective forms of deception in cyberspace, and discuss how these deceptions are used in attacks. After a general assessment of ...
Trassare, Samuel T. (Monterey, California: Naval Postgraduate School, 2013-03);Adversaries scan Department of Defense networks looking for vulnerabilities that allow surveillance or the embedding of destructive malware weapons. In cyberspace, adversaries either actively probe or passively observe ...
Rowe, Neil C. (Monterey, California. Naval Postgraduate School, 2008);We examine the main ethical issues concerning deception in cyberspace. We first discuss the concept of deception and survey ethical theories applicable to cyberspace. We then examine deception for commercial gain such as ...