Cyber Ricochet: Risk Management and Cyberspace Operations
ARMY WAR COLL CARLISLE BARRACKS PA CENTER FOR STRATEGIC LEADERSHIP
Pagination or Media Count:
Recent media reports of the Duqu , Flame , and Stuxnet malware highlight cyberspace operations capabilities as well as emphasize the vulnerabilities of computer networks and systems. Many computer security vulnerabilities go undetected for years and once discovered vendors can take months to correct the defects. Even after vendors release patches to correct the problem, most users fail to update their systems immediately and completely. The result is a cyberspace environment plagued with undefended systems where seams and gaps are exposed to even the most novice cyber threat actor. Senior leaders, responsible for approving cyberspace operations, should consider options utilizing intrusions into an adversary s networks and systems that leverage computer security vulnerabilities. Cyberspace operations have the potential of achieving objectives faster, risking fewer lives, and saving money. Although cyberspace operations can cause an array of effects, this paper will focus on reports that have shown that cyberspace experts can infiltrate networks and systems to conduct intelligence collection and sabotage. Cyber tools provide capabilities to achieve objectives before, during, and after hostilities while maintaining a degree of anonymity. However, as noted above, most computers are vulnerable and care must be taken to prevent these tools from being used against friendly networks and systems.
- Computer Systems Management and Standards