Cyber Defense Exercises and their Role in Cyber Warfare


  • Bogdan Alexandru Bratosin The Bucharest University of Economic Studies


cyber defense exercises, cyber-attack, cyber terrorism, cyber warfare, cyber espionage, information assurance


The threat of cyber-attacks is increasing with the access to PC’s and Internet of a larger number of people around the world. Although the Internet provides a large number of advantages, it can also be used as a cyber-weapon in order to serve the interests of counties, political and economic groups or individual. The cyber-attacks of today are capable to disable the manufacturing of nuclear bombs of a country. Thus, there is an increasing demand for IT security specialists. Cyber-defense exercises (CDX) are by far the most complex and up to date methods of training the next generation of IT security specialists.

Author Biography

Bogdan Alexandru Bratosin, The Bucharest University of Economic Studies

IT&C Security Master


Stoil, R.A. & Goldstein, J. (28 Jun 2006) “One if by Land, Two if by Modem,” The Jerusalem Post.

Fulghum, D.A., Wall, R. & Butler, A. (26 Nov 2007) “Cyber-Combat’s First Shot,” Aviation Week & Space Technology 167(21) 28.

“Remarks by the President on Securing our Nation’s Cyber Infrastructure,” (29 May 2009) The White House: Office of the Press Secretary:

Falkenrath, R.A. (26 Jan 2011) “From Bullets to Megabytes,” The New York Times.

Kushner David - The Real Story of Stuxnet (26 Feb 2013)

Strategic Cyber Security – Kenneth Geers – 2011 CCD COE

“Tracking GhostNet: Investigating a Cyber Espionage Network,” (29 Mar 2009) Information Warfare Monitor.

Geers K. (2007a) “Greetz from Room 101,” DEF CON, Black Hat 1-24.

Verton, D. (2002) The Hacker Diaries: Confessions of Teenage Hackers (NY: McGraw-Hill/Osborne).

Department of Defense Strategy for Operating in Cyberspace – July 2011

William J. Adams et al. - Collective Views of the NSA/CSS Cyber Defense Exercises on Curricula and Learning Objectives.




How to Cite

Bratosin, B. A. (2014). Cyber Defense Exercises and their Role in Cyber Warfare. Journal of Mobile, Embedded and Distributed Systems, 6(2), 70-76. Retrieved from