Key terrain: application to the layers of cyberspace
Pantin, Nicholas T.
MetadataShow full item record
The concept of key terrain is a common fixture in military strategy and tactics. The emergence of cyberspace, with characteristics unseen in any warfighting domain, challenge the concept's value. This work is a conceptual analysis that examines the applicability of key terrain in the cyber domain. To determine if key terrain applies in cyberspace, we examine key terrain in traditional physical warfighting domains to understand the concept and draw comparisons. Each of the three layers of cyberspace is examined to determine if the concept of key terrain applies and to identify challenges presented when applying the concept. The result of this work finds key terrain to hold value and applicability within cyberspace. Key terrain can be found at each layer of cyberspace but with some considerations. Cyber key terrain requires constant reassessment, exists only under certain conditions, and can present difficulties in terms of measuring seizure and retention of terrain in cyberspace. The conclusion additionally finds that while cyberspace is unique, it does not require a cyber-specific key terrain definition. We recommend that changes be made to future doctrine, institutional education, and leader development in an effort to provide clarity when using traditional military concepts such as key terrain in cyberspace.
RightsThis publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.
Showing items related by title, author, creator and subject.
Asset Criticality in Mission Reconfigurable Cyber Systems and its Contribution to Key Cyber Terrain Parker, Thomas (HICSS, 04 Jan 201);The concept of a common operational picture has been utilized by the military for situational awareness in warfare domains for many years. With the emergence of cyberspace as a domain, there is a necessity to develop ...
Trassare, Samuel T. (Monterey, California: Naval Postgraduate School, 2013-03);Adversaries scan Department of Defense networks looking for vulnerabilities that allow surveillance or the embedding of destructive malware weapons. In cyberspace, adversaries either actively probe or passively observe ...
Rowe, Neil C.; Custy, E. John (2007);Cyberspace, computers and networks, is now potential terrain of warfare. We describe some effective forms of deception in cyberspace, and discuss how these deceptions are used in attacks. After a general assessment of ...