Question: Q. Write an Annotated Bibliography on this article The Cyber Decade: Cyber Defence at a X-ing Point As a consequence of the cyber attacks on

Q. Write an Annotated Bibliography on this article

The Cyber Decade: Cyber Defence at a X-ing Point

As a consequence of the cyber attacks on Estonia in 2007, both the consideration and use of cyberspace by the military has fundamentally changed and will continue to do so. Over the years, such attacks have effectively demonstrated how significant impacts can be wrought by supposedly trivial and low-key means. On the other hand, military forces also depend strongly on the rapid exchange of information for their decision-making process so their forces can gain battlefield superiority, which enforces the need for network-enabled capabilities (NEC) [1] to realize networkcentric warfare (NCW) [2]. This creates a challenging and complex system of interdependencies, opening a broad spectrum of possible attack vectors. Therefore, operations in cyberspace can be used to generate effects not only in cyberspace itself, but also in the physical environment, which is an attractive new capability for military commanders. Indeed, armed forces worldwide now highly value the new role of cyber, and are building cyber commands and establishing new operational capabilities, and the asymmetric nature of cyber warfare can give the advantage to armed forces otherwise in possession of comparatively smaller weaponry. However, the complexity of sophisticated cyber attacks like Stuxnet can also imply the opposite. Thus, cyber defence is also of enormous importance. And while numerous technologies proposed over recent years have not improved cyber security significantly, this may change with upcoming new concepts and systems. Blockchains, quantum-secured communication, mathematically verified software microkernels, and trusted hardware platforms are likely to be key elements for new, more secure systems. Along with the armaments industry itself developing a better understanding of cyber threats, this should lead to better and more resilient weapon systems. In light of these thoughts, the paper analyses the development of both cyber threats and defence capabilities over the past 10 years from 2007 to 2017, evaluates the current situation and gives recommendations for further development. The paper is structured as follows: first, general conditions for military forces with respect to cyber are described and dependencies and requirements are highlighted. Second, a brief overview of the development of cyber threats and defence capabilities during the past ten years is given, including a discussion of the usefulness of the measures. Upcoming technologies which are important for cyber security are briefly discussed to analyse opportunities for more secure systems. Finally, the conclusions of the paper are summarized and requirements for the further development of cyber defence are derived. 161 2. DETERMINING FACTORS For all the millennia of warfare that have passed, the tools and tactics of how armies fight have evolved as military technologies have evolved [2]. However, recent years have seen fundamental changes come to affect the very character of war [2]. Military forces worldwide are increasingly capitalizing on the advances and advantages of information technology to facilitate radical changes in the way they structure and deliver offensive and defensive capabilities [1]. The US Navy was among the first to investigate how to use Information and Communication Technology (ICT) to increase the efficiency and efficacy of their forces on the 21st Century battlefield [3], the main consequence being the increased integration of individual, hitherto autonomously acting systems, thus a fundamental shift from what is called platform-centric warfare to network-centric warfare (NCW). NCW harnesses network technology to facilitate radical improvements in the shared awareness of disposition and intent, together with a capability for rapid reconfiguration, and synchronization of operations [1] and thus improves both the efficiency and effectiveness of military operations [4]. As such, NCW creates superiority in war by harvesting information from a network of reconnaissance systems and enabling its analysis and use by command and control centres, as well as use in weapons systems. Hence military superiority across the entire range of military operations, i.e. full spectrum dominance, is achieved. The vision for NCW is to provide seamless access to timely information at every echelon in the military hierarchy and enable all elements to share information within a single, coherent, complete, and dynamically accurate picture of the battlefield. It is intended that NCW will produce an improved understanding both of the intent of higher command and of the operational situation at all levels of command, with every element better able to tap into the collective knowledge and reduce the fog and friction [4] of war, and enable the optimal use of resources. Although the transformation towards NCW is not finalized completely, even not by the United States [1, 4], NCW is anticipated to be one of the greatest revolutions in military operations in the past 200 years .

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related General Management Questions!