Accession Number : ADA536758


Title :   Offensive Cyber Capability: Can it Reduce Cyberterrorism


Descriptive Note : Monograph rept. Jan-Dec 2010


Corporate Author : ARMY COMMAND AND GENERAL STAFF COLL FORT LEAVENWORTH KS SCHOOL OF ADVANCED MILITARY STUDIES


Personal Author(s) : Marshall, Stephen M


Full Text : https://apps.dtic.mil/dtic/tr/fulltext/u2/a536758.pdf


Report Date : 02 Dec 2010


Pagination or Media Count : 65


Abstract : The subject of cyberterrorism has become a topic of increasing importance to both the U.S. government and military. Offensive cyber capabilities provide a means to mitigate risk to U.S. systems that depend on the Internet to conduct business. In combination with passive security measures, offensive cyber capabilities seem to add to the level of Internet security thereby securing cyberspace for all Americans. The intent of this monograph is to identify the strengths and weaknesses of an offensive cyber capability in order to visualize the various options and tradeoffs necessary to achieve an acceptable level of security. The idea of convergence continues to bring together separate technologies using the Internet in order to interact and become more efficient. The effect of this phenomenon has increased the speed with which information is shared, helped business become more competitive and provided different means to distribute information. This same convergence has made the Internet a prime target as it has the potential to affect the economy, critical infrastructure and limit the freedoms of others in the cyberspace arena. Due to the increasing complexity of technology, vulnerabilities will continue to surface that can be taken advantage of. Technology is also becoming cheaper and easier to operate granting any motivated individual with access to the Internet the ability identify network vulnerabilities and exploit them. These themes are important as they identify that the U.S. is highly dependent on the Internet making it imperative that feasible security options must be identified in order to secure cyberspace. A cyberterrorist act has not occurred therefore there is no empirical evidence to develop case studies upon and generate learning.


Descriptors :   *CYBERTERRORISM , NETWORKS , THREATS , SECURITY , VULNERABILITY , TARGETS , CASE STUDIES , TRADE OFF ANALYSIS , LEARNING , INFRASTRUCTURE , MODELS , PASSIVE SYSTEMS


Subject Categories : Unconventional Warfare
      Countermeasures


Distribution Statement : APPROVED FOR PUBLIC RELEASE