Weathering the Cyber Storm: The Military's Resiliency to Cyber Attacks in Future Warfare
AIR UNIV MAXWELL AFB AL MAXWELL AFB United States
Pagination or Media Count:
This study examines what the military should do to be resilient against cyber attacks. Its basis rests on two major assumptions. First, it assumes the United States adversaries will attempt to use attacks against the military. Second, it assumes some of these attacks will be successful despite established defenses. The military must be prepared to continue its mission despite cyber attacks. To do so, the military must act along two major axes of effort. First, those units that use cyberspace combat units and support units must develop procedures to operate in a denied or degraded cyber environment. This process requires them to assess areas that have become reliant on cyberspace. A robust analysis forces the units to consider everything from the technology they use to the way they train their leaders. The units then must exercise the procedures developed from this analysis and adequately train personnel. Second, those responsible for cyber defense must ensure the effects of a cyber attack are fleeting. Alternate operating procedures utilize military force sub-optimally. Cyber defenders use a mix of active and passive defenses to halt the attack. Their goal is to restore service and allow military units to return to normal operating procedures, and thus, restore military capability. Cyber defenders must integrate with the more traditional forms of operations. They must have the wherewithal to posture themselves and react in a manner most conducive to the operating force. The organizational structure must change to accommodate this integration.
- Military Forces and Organizations
- Computer Systems Management and Standards