رکورد قبلیرکورد بعدی

" Exploring the Policies, Cybersecurity Strategists Need to Combat Non-state Actors in the Cyber-Domain of U.S. Military Warfare "


Document Type : Latin Dissertation
Language of Document : English
Record Number : 1051095
Doc. No : TL50212
Main Entry : Scalise, Benjamin F., III
Title & Author : Exploring the Policies, Cybersecurity Strategists Need to Combat Non-state Actors in the Cyber-Domain of U.S. Military Warfare\ Scalise, Benjamin F., IIIJordan, Lizabeth
College : Colorado Technical University
Date : 2019
Degree : D.C.S.
student score : 2019
Note : 106 p.
Abstract : The purpose of this qualitative exploratory study is to explore the policies cybersecurity strategists to combat non-state actors in the cyber-domain of U.S. military warfare. The research question driving this study was: What are the policies a cybersecurity strategist needs to combat non-state actors in the cyber-domain of military warfare? This qualitative exploratory study used a semistructured interview with open-ended questioning of 10 participants who were all military service members deployed to Iraq or Afghanistan since the September 11th, 2001 terrorist attacks and served in an information technology capacity during such a deployment. Four themes emerged from the interviews including: The themes were: combination strategy, ethical high-ground, actionable intelligence, and attribution. Theme 1 concerned the adoption of an overall strategy that at a minimum combined the approaches of offense, defense, intelligence, and deterrence as an overall strategy of the U.S. military in the cyber-domain of warfare against non-state actors. Theme 2 concerned the ethical standing that should be taken when combating non-state actors that do not follow laws or policies in cyber-warfare. Theme 3 articulated the need for intelligence that can help to drive operations in the cyber-domain. Theme 4 demonstrated the concern of being able to attribute an actor with an act of aggression in the cyber-domain of military warfare. The study provides a direction which cybersecurity strategists and military professionals alike can utilize to move forward and develop the operational aspects that fall into a combination strategy. Keywords: cyber-domain, cyber-warfare, non-state actors, attribution
Descriptor : Computer science
: Information technology
: Military studies
Added Entry : Jordan, Lizabeth
Added Entry : Colorado Technical University
کپی لینک

پیشنهاد خرید
پیوستها
عنوان :
نام فایل :
نوع عام محتوا :
نوع ماده :
فرمت :
سایز :
عرض :
طول :
2201097563_224.pdf
2201097563.pdf
پایان نامه لاتین
متن
application/pdf
1017.89 KB
85
85
نظرسنجی
نظرسنجی منابع دیجیتال

1 - آیا از کیفیت منابع دیجیتال راضی هستید؟