• DocumentCode
    2695960
  • Title

    Cyber military strategy for cyberspace superiority in cyber warfare

  • Author

    Eom, Jung-Ho ; Kim, Nam-Uk ; Kim, Sung-Hwan ; Chung, Tai-Myoung

  • Author_Institution
    Dept. of Mil. Studies, Daejeon Univ., Daejeon, South Korea
  • fYear
    2012
  • fDate
    26-28 June 2012
  • Firstpage
    295
  • Lastpage
    299
  • Abstract
    In this paper, we proposed robust and operational cyber military strategy for cyberspace superiority in cyber warfare. We considered cyber forces manpower, cyber intelligence capability, and an organization of cyber forces for improving cyber military strategy. In cyber forces power field, we should cultivated personals that can perform network computer operations and hold cyber security technology such as cyber intelligence collection, cyber-attack, cyber defence, and cyber forensics. Cyber intelligence capability includes cyber surveillance/reconnaissance, cyber order of battle, pre-CTO, and cyber damage assessment. An organization of cyber forces has to change tree structure to network structure and has to organize task or functional centric organizations. Our proposed cyber military strategy provides prior decision of action to operate desired effects in cyberspace.
  • Keywords
    military computing; security of data; cyber attack; cyber damage assessment; cyber defence; cyber forces manpower; cyber forensics; cyber intelligence capability; cyber intelligence collection; cyber order of battle; cyber security technology; cyber surveillance/reconnaissance; cyber warfare; cyberspace superiority; functional centric organization; network computer operations; network structure; operational cyber military strategy; Computer crime; Cyberspace; Military aircraft; Military computing; Organizations; Robustness; cyber military strategy; cyberspace superiority; security;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), 2012 International Conference on
  • Conference_Location
    Kuala Lumpur
  • Print_ISBN
    978-1-4673-1425-1
  • Type

    conf

  • DOI
    10.1109/CyberSec.2012.6246114
  • Filename
    6246114