Analysis of Cyber Security Methodologies: A Direct Comparison of Current Versus Possible DoD Cyber Assets
Main Article Content
Abstract
Article Details
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
The copyediting stage is intended to improve the flow, clarity, grammar, wording, and formatting of the article. It represents the last chance for the author to make any substantial changes to the text because the next stage is restricted to typos and formatting corrections. The file to be copyedited is in Word or .rtf format and therefore can easily be edited as a word processing document. The set of instructions displayed here proposes two approaches to copyediting. One is based on Microsoft Word's Track Changes feature and requires that the copy editor, editor, and author have access to this program. A second system, which is software independent, has been borrowed, with permission, from the Harvard Educational Review. The journal editor is in a position to modify these instructions, so suggestions can be made to improve the process for this journal.
References
Albury, D. (2005). Fostering Innovation in Public Services. Public Money And Management, 25(1), 51-56.
Amadeo, K. (2018). 5 U.S. GDP Statistics You Need to Know. The Balance. Retrieved 8 March 2018, from https://www.thebalance.com/u-s-gdp-5-latest-statistics-and-how-to-use-them-3306041
Army Air Forces - United States Army Aviation. (2018). Army.mil. Retrieved 8 March 2018, from https://www.army.mil/aviation/airforces/index.html
Attar, A. (2017). 10 Highly Powerful Air Forces in the World (2018 Ranking). ListoGraphic. Retrieved 8 March 2018, from http://listographic.com/10-powerful-air-force
Barno, D., & Bensahel, N. (2017). Three Things the Army Chief of Staff Wants You to Know. War on the Rocks. Retrieved 8 March 2018, from https://warontherocks.com/2017/05/three-things-the-army-chief-of-staff-wants-you-to-know/
Choucri, N., Madnick, S., & Ferwerda, J. (2013). Institutions for Cyber Security: International Responses and Global Imperatives. Information Technology For Development, 20(2), 96-121. http://dx.doi.org/10.1080/02681102.2013.836699
Commons, A. (2018). Cyber is the New Air Domain Superiority in the Megacity. Military Review. Retrieved from http://www.armyupress.army.mil/Journals/Military-Review/English-Edition-Archives/January-February-2018/cyber-is-the-New-Air-Domain-Superiority-in-the-Megacity/
Cox, M. (2018). Army to Stress More Emergency-Deployment Training in 2018. Military.com. Retrieved 8 March 2018, from https://www.military.com/daily-news/2018/02/13/army-stress-more-emergency-deployment-training-2018.html
Cyber Incident Response: What Is It, And Why Do You Need It? - Securonix. (2017). Securonix. Retrieved 25 March 2018, from https://www.securonix.com/cyber-incident-response/
Department of Defense. (2018). Summary of the National Defense Strategy of The United States of America (p. 1). United States of America.
Greenberg, A. (2017). How An Entire Nation Became Russia's Test Lab for Cyberwar. WIRED. Retrieved 8 March 2018, from https://www.wired.com/story/russian-hackers-attack-ukraine/
Hammons, M. (2016). The Origin of the U.S. Air Force - VeteranAid. VeteranAid. Retrieved 8 March 2018, from https://www.veteranaid.org/blog/2016/04/12/the-origin-of-the-u-s-air-force/
Hermes, W. (2001). American Military History (pp. 591-619). United States Army. Retrieved from https://history.army.mil/books/AMH/AMH-27.htm
Kilcarr, S. (2016). Survey says corporate cyber response still too slow. Fleet Owner. Retrieved 25 March 2018, from http://www.fleetowner.com/blog/survey-says-corporate-cyber-response-still-too-slow
Koppel, T. (2015). Lights out (pp. 121-126). New York: Broadway Books.
Langner, R. (2011). Stuxnet: Dissecting a Cyberwarfare Weapon. IEEE Security & Privacy Magazine, 9(3), 49-51. http://dx.doi.org/10.1109/msp.2011.67
Lee, R., Assante, M., & Conway, T. (2016). Analysis of the Cyber Attack on the Ukrainian Power Grid. Electricity Information Sharing And Analysis Center, v-vi. Retrieved from https://ics.sans.org/media/E-ISAC_SANS_Ukraine_DUC_5.pdf
McCarthy, T. (2018). Does the US really need a huge boost in military spending?. The Guardian. Retrieved 8 March 2018, from https://www.theguardian.com/us-news/2018/feb/09/senate-budget-deal-us-military-spending
Pomerleau, M. (2017a). Army, Navy Cyber teams say they’re ready to go ... a year early. Fifth Domain. Retrieved 8 March 2018, from https://www.fifthdomain.com/dod/2017/11/02/army-navy-cyber-teams-say-theyre-ready-to-go-a-year-early/
Pomerleau, M. (2017b). DoD still working toward CYBERCOM elevation. Fifth Domain. Retrieved 8 March 2018, from https://www.fifthdomain.com/dod/cybercom/2017/10/16/dod-still-working-toward-cybercom-elevation/
Richardson, G. (2012). The United States Army’s Current Capability to Conduct Combined Arms Maneuver (pp. 37-49). Fort Leavonworth, Kansas: United States Army Command and General Staff College.
Stavridis, J., & Weinstein, D. (2014). Time for a U.S. Cyber Force. Proceedings Magazine, (140). Retrieved from https://www.usni.org/magazines/proceedings/2014-01/time-us-cyber-force
Sullivan, J., & Kamensky, D. (2017). How cyber-attacks in Ukraine show the vulnerability of the U.S. power grid. The Electricity Journal, 30(3), 30-35. http://dx.doi.org/10.1016/j.tej.2017.02.006
Timeline of Army Cyber. (2017). goarmy.com. Retrieved 8 March 2018, from https://www.goarmy.com/army-cyber/timeline-of-army-cyber.html
U.S. Army Cyber Command. (2016). Integration of cyberspace capabilities into tactical units. www.army.mil. Retrieved 8 March 2018, from https://www.army.mil/article/163156/integration_of_cyberspace_capabilities_into_tactical_units
U.S. Army Cyber Command | The U.S. Army. (2018). www.army.mil. Retrieved 26 March 2018, from https://www.army.mil/armycyber#org-about
Zetter, K. (2014). An Unprecedented Look at Stuxnet, the World's First Digital Weapon. WIRED. Retrieved 8 March 2018, from https://www.wired.com/2014/11/countdown-to-zero-day-stuxnet/