Cyber Defense Exercises and their Role in Cyber Warfare

Bogdan Alexandru Bratosin

Abstract


The threat of cyber-attacks is increasing with the access to PC’s and Internet of a larger number of people around the world. Although the Internet provides a large number of advantages, it can also be used as a cyber-weapon in order to serve the interests of counties, political and economic groups or individual. The cyber-attacks of today are capable to disable the manufacturing of nuclear bombs of a country. Thus, there is an increasing demand for IT security specialists. Cyber-defense exercises (CDX) are by far the most complex and up to date methods of training the next generation of IT security specialists.

Keywords


cyber defense exercises, cyber-attack, cyber terrorism, cyber warfare, cyber espionage, information assurance

Full Text:

PDF

References


Stoil, R.A. & Goldstein, J. (28 Jun 2006) “One if by Land, Two if by Modem,” The Jerusalem Post.

Fulghum, D.A., Wall, R. & Butler, A. (26 Nov 2007) “Cyber-Combat’s First Shot,” Aviation Week & Space Technology 167(21) 28.

“Remarks by the President on Securing our Nation’s Cyber Infrastructure,” (29 May 2009) The White House: Office of the Press Secretary: www.whitehouse.gov.

Falkenrath, R.A. (26 Jan 2011) “From Bullets to Megabytes,” The New York Times.

Kushner David - The Real Story of Stuxnet (26 Feb 2013)

Strategic Cyber Security – Kenneth Geers – 2011 CCD COE

“Tracking GhostNet: Investigating a Cyber Espionage Network,” (29 Mar 2009) Information Warfare Monitor.

Geers K. (2007a) “Greetz from Room 101,” DEF CON, Black Hat 1-24.

Verton, D. (2002) The Hacker Diaries: Confessions of Teenage Hackers (NY: McGraw-Hill/Osborne).

Department of Defense Strategy for Operating in Cyberspace – July 2011

William J. Adams et al. - Collective Views of the NSA/CSS Cyber Defense Exercises on Curricula and Learning Objectives.


Refbacks

  • There are currently no refbacks.


Journal of Mobile, Embedded and Distributed Systems (JMEDS) ISSN: 2067 – 4074 (online)