Analysis of Cyber Security Methodologies: A Direct Comparison of Current Versus Possible DoD Cyber Assets
DOI:
https://doi.org/10.37266/ISER.2018v6i2.pp101-108Abstract
Recent years and modern warfare have shown an increasing reliance on the cyber domain to maintain national and military operability, resulting in cyber exploits having a more profound impact on victim nations. As the United States seeks to maximize its ability to capitalize on these exploits and minimize its susceptibility, a decision must be made on the most effective way to accomplish these tasks. Currently, each major department within the Department of Defense (DoD) are methodically building up their own cyber assets to accomplish these tasks as they relate to their traditional domain. There has been a recent proposal to do away with this system structure and instead create a separate Cyber Department, on the same level as the Army, Navy, etc. This paper evaluates the comparative value between the two proposals through value modeling. The value model is based on each alternative’s ability to achieve the end state cyber goals of the DoD and the nation as a whole. Strong indicators point towards a separate Cyber Department as the most valuable alternative available to achieve the nation’s goals, and that there are current weaknesses within our current cyber structure that are open for exploitation.References
Albury, D. (2005). Fostering Innovation in Public Services. Public Money And Management, 25(1), 51-56.
Amadeo, K. (2018). 5 U.S. GDP Statistics You Need to Know. The Balance. Retrieved 8 March 2018, from https://www.thebalance.com/u-s-gdp-5-latest-statistics-and-how-to-use-them-3306041
Army Air Forces - United States Army Aviation. (2018). Army.mil. Retrieved 8 March 2018, from https://www.army.mil/aviation/airforces/index.html
Attar, A. (2017). 10 Highly Powerful Air Forces in the World (2018 Ranking). ListoGraphic. Retrieved 8 March 2018, from http://listographic.com/10-powerful-air-force
Barno, D., & Bensahel, N. (2017). Three Things the Army Chief of Staff Wants You to Know. War on the Rocks. Retrieved 8 March 2018, from https://warontherocks.com/2017/05/three-things-the-army-chief-of-staff-wants-you-to-know/
Choucri, N., Madnick, S., & Ferwerda, J. (2013). Institutions for Cyber Security: International Responses and Global Imperatives. Information Technology For Development, 20(2), 96-121. http://dx.doi.org/10.1080/02681102.2013.836699
Commons, A. (2018). Cyber is the New Air Domain Superiority in the Megacity. Military Review. Retrieved from http://www.armyupress.army.mil/Journals/Military-Review/English-Edition-Archives/January-February-2018/cyber-is-the-New-Air-Domain-Superiority-in-the-Megacity/
Cox, M. (2018). Army to Stress More Emergency-Deployment Training in 2018. Military.com. Retrieved 8 March 2018, from https://www.military.com/daily-news/2018/02/13/army-stress-more-emergency-deployment-training-2018.html
Cyber Incident Response: What Is It, And Why Do You Need It? - Securonix. (2017). Securonix. Retrieved 25 March 2018, from https://www.securonix.com/cyber-incident-response/
Department of Defense. (2018). Summary of the National Defense Strategy of The United States of America (p. 1). United States of America.
Greenberg, A. (2017). How An Entire Nation Became Russia's Test Lab for Cyberwar. WIRED. Retrieved 8 March 2018, from https://www.wired.com/story/russian-hackers-attack-ukraine/
Hammons, M. (2016). The Origin of the U.S. Air Force - VeteranAid. VeteranAid. Retrieved 8 March 2018, from https://www.veteranaid.org/blog/2016/04/12/the-origin-of-the-u-s-air-force/
Hermes, W. (2001). American Military History (pp. 591-619). United States Army. Retrieved from https://history.army.mil/books/AMH/AMH-27.htm
Kilcarr, S. (2016). Survey says corporate cyber response still too slow. Fleet Owner. Retrieved 25 March 2018, from http://www.fleetowner.com/blog/survey-says-corporate-cyber-response-still-too-slow
Koppel, T. (2015). Lights out (pp. 121-126). New York: Broadway Books.
Langner, R. (2011). Stuxnet: Dissecting a Cyberwarfare Weapon. IEEE Security & Privacy Magazine, 9(3), 49-51. http://dx.doi.org/10.1109/msp.2011.67
Lee, R., Assante, M., & Conway, T. (2016). Analysis of the Cyber Attack on the Ukrainian Power Grid. Electricity Information Sharing And Analysis Center, v-vi. Retrieved from https://ics.sans.org/media/E-ISAC_SANS_Ukraine_DUC_5.pdf
McCarthy, T. (2018). Does the US really need a huge boost in military spending?. The Guardian. Retrieved 8 March 2018, from https://www.theguardian.com/us-news/2018/feb/09/senate-budget-deal-us-military-spending
Pomerleau, M. (2017a). Army, Navy Cyber teams say they’re ready to go ... a year early. Fifth Domain. Retrieved 8 March 2018, from https://www.fifthdomain.com/dod/2017/11/02/army-navy-cyber-teams-say-theyre-ready-to-go-a-year-early/
Pomerleau, M. (2017b). DoD still working toward CYBERCOM elevation. Fifth Domain. Retrieved 8 March 2018, from https://www.fifthdomain.com/dod/cybercom/2017/10/16/dod-still-working-toward-cybercom-elevation/
Richardson, G. (2012). The United States Army’s Current Capability to Conduct Combined Arms Maneuver (pp. 37-49). Fort Leavonworth, Kansas: United States Army Command and General Staff College.
Stavridis, J., & Weinstein, D. (2014). Time for a U.S. Cyber Force. Proceedings Magazine, (140). Retrieved from https://www.usni.org/magazines/proceedings/2014-01/time-us-cyber-force
Sullivan, J., & Kamensky, D. (2017). How cyber-attacks in Ukraine show the vulnerability of the U.S. power grid. The Electricity Journal, 30(3), 30-35. http://dx.doi.org/10.1016/j.tej.2017.02.006
Timeline of Army Cyber. (2017). goarmy.com. Retrieved 8 March 2018, from https://www.goarmy.com/army-cyber/timeline-of-army-cyber.html
U.S. Army Cyber Command. (2016). Integration of cyberspace capabilities into tactical units. www.army.mil. Retrieved 8 March 2018, from https://www.army.mil/article/163156/integration_of_cyberspace_capabilities_into_tactical_units
U.S. Army Cyber Command | The U.S. Army. (2018). www.army.mil. Retrieved 26 March 2018, from https://www.army.mil/armycyber#org-about
Zetter, K. (2014). An Unprecedented Look at Stuxnet, the World's First Digital Weapon. WIRED. Retrieved 8 March 2018, from https://www.wired.com/2014/11/countdown-to-zero-day-stuxnet/
Published
How to Cite
Issue
Section
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
The copyediting stage is intended to improve the flow, clarity, grammar, wording, and formatting of the article. It represents the last chance for the author to make any substantial changes to the text because the next stage is restricted to typos and formatting corrections. The file to be copyedited is in Word or .rtf format and therefore can easily be edited as a word processing document. The set of instructions displayed here proposes two approaches to copyediting. One is based on Microsoft Word's Track Changes feature and requires that the copy editor, editor, and author have access to this program. A second system, which is software independent, has been borrowed, with permission, from the Harvard Educational Review. The journal editor is in a position to modify these instructions, so suggestions can be made to improve the process for this journal.