|
" Exploring the Policies, Cybersecurity Strategists Need to Combat Non-state Actors in the Cyber-Domain of U.S. Military Warfare "
Scalise, Benjamin F., III
Jordan, Lizabeth
Document Type
|
:
|
Latin Dissertation
|
Language of Document
|
:
|
English
|
Record Number
|
:
|
1051095
|
Doc. No
|
:
|
TL50212
|
Main Entry
|
:
|
Scalise, Benjamin F., III
|
Title & Author
|
:
|
Exploring the Policies, Cybersecurity Strategists Need to Combat Non-state Actors in the Cyber-Domain of U.S. Military Warfare\ Scalise, Benjamin F., IIIJordan, Lizabeth
|
College
|
:
|
Colorado Technical University
|
Date
|
:
|
2019
|
Degree
|
:
|
D.C.S.
|
student score
|
:
|
2019
|
Note
|
:
|
106 p.
|
Abstract
|
:
|
The purpose of this qualitative exploratory study is to explore the policies cybersecurity strategists to combat non-state actors in the cyber-domain of U.S. military warfare. The research question driving this study was: What are the policies a cybersecurity strategist needs to combat non-state actors in the cyber-domain of military warfare? This qualitative exploratory study used a semistructured interview with open-ended questioning of 10 participants who were all military service members deployed to Iraq or Afghanistan since the September 11th, 2001 terrorist attacks and served in an information technology capacity during such a deployment. Four themes emerged from the interviews including: The themes were: combination strategy, ethical high-ground, actionable intelligence, and attribution. Theme 1 concerned the adoption of an overall strategy that at a minimum combined the approaches of offense, defense, intelligence, and deterrence as an overall strategy of the U.S. military in the cyber-domain of warfare against non-state actors. Theme 2 concerned the ethical standing that should be taken when combating non-state actors that do not follow laws or policies in cyber-warfare. Theme 3 articulated the need for intelligence that can help to drive operations in the cyber-domain. Theme 4 demonstrated the concern of being able to attribute an actor with an act of aggression in the cyber-domain of military warfare. The study provides a direction which cybersecurity strategists and military professionals alike can utilize to move forward and develop the operational aspects that fall into a combination strategy. Keywords: cyber-domain, cyber-warfare, non-state actors, attribution
|
Descriptor
|
:
|
Computer science
|
|
:
|
Information technology
|
|
:
|
Military studies
|
Added Entry
|
:
|
Jordan, Lizabeth
|
Added Entry
|
:
|
Colorado Technical University
|
| |