Art07-网络空间的地形及其对运营的影响

ID:23704

大小:1.90 MB

页数:16页

时间:2022-11-29

金币:15

上传者:战必胜
123
The Topography of
Cyberspace and Its
Consequences for
Operations
*
Abstract: For all the focus on cyberspace as a source of security threats and a domain
of military operations, there has been little progress on establishing a consistent
approach to describing what constitutes cyberspace. Dozens of denitions of the term
“cyberspace” have been developed, but consensus on its essential attributes has yet
to be achieved. Similarly, a number of different models have been offered to describe
cyberspace in terms of layers, such as the physical, logical and cyber persona layers
used in US Joint Publication 3-12, Cyberspace Operations. This paper argues that
cyberspace as a label for a domain should not be confused with the individual networks
– some interconnected (“open”) and some relatively isolated (“closed”) – involved in
military operations. As illustrated by the STEADFAST COBALT exercise, military
operations often involve a complex set of networks. The paper then uses the example of
the Internet to illustrate the need to take a topographical approach – one that identies
the features of the objects or entities and their structural relationships to enable
effective military operations. This more detailed topographical view of the Internet is
used to illustrate how cyberspace considerations relate to existing operational doctrine
such as concepts from the operational environment (Joint Operational Area and Area
of Interest). Some considerations t well within this framework. Others require some
adaptation, such as shifting some responsibilities to a centralized and persistent
function such as the Cyberspace Operations Centre (CyOC) being established by
NATO. Others fall outside military control and are better addressed through civil-
military cooperation. This example also illustrates how precision in describing the
Brad Bigelow
Principal Technical Advisor
SHAPE DCOS CIS and Cyber Defence
Mons, Belgium
brad.bigelow@shape.nato.int
2018 10th International Conference on Cyber Conict
CyCon X: Maximising Eects
T. Minárik, R. Jakschis, L. Lindström (Eds.)
2018 © NATO CCD COE Publications, Tallinn
Permission to make digital or hard copies of this publication for internal
use within NATO and for personal or educational use when for non-prot or
non-commercial purposes is granted providing that copies bear this notice
and a full citation on the rst page. Any other reproduction or transmission
requires prior written permission by NATO CCD COE.
*
The views and opinions expressed in this article are those of the author alone and do not necessarily reect
those of NATO.
资源描述:

当前文档最多预览五页,下载文档查看全文

此文档下载收益归作者所有

当前文档最多预览五页,下载文档查看全文
温馨提示:
1. 部分包含数学公式或PPT动画的文件,查看预览时可能会显示错乱或异常,文件下载后无此问题,请放心下载。
2. 本文档由用户上传,版权归属用户,天天文库负责整理代发布。如果您对本文档版权有争议请及时联系客服。
3. 下载前请仔细阅读文档内容,确认文档内容符合您的需求后进行下载,若出现内容与标题不符可向本站投诉处理。
4. 下载文档时可能由于网络波动等原因无法下载或下载错误,付费完成后未能成功下载的用户请联系客服处理。
关闭