Projects per year
Abstract
Cyber Operations stopped being utopia or Sci-Fi based scenarios: they became reality. When planning and conducting them, military actors encounter difficulties since they lack methodologies and models that support their actions and assess their effects. To address these issues by tackling the underlying scientific and practical gap, this article proposes an assessment methodology for the intended and unintended effects of Cyber Operations, labeled as Military Advantage, Collateral Damage and Military Disadvantage, and aims at supporting the targeting process when engaging targets in Cyber Operations. To arrive at this methodology, an extensive review on literature, military doctrine and methodologies was conducted combined with two series of interviews with military commanders and field work in joint military exercises. The assessment methodology is proposed considering multidimensional factors, phases and steps in a technical - military approach. For validation, one realistic Cyber Operation case study was conducted in a focus group with nine military experts plus four face-to-face meetings with another four military experts.
Original language | English |
---|---|
Title of host publication | 2018 IEEE Military Communications Conference, MILCOM 2018 |
Editors | Stanley (Scott) Gustafson |
Publisher | IEEE |
Pages | 438-443 |
Number of pages | 6 |
Volume | 2019-October |
ISBN (Electronic) | 978-1-5386-7185-6 |
DOIs | |
Publication status | Published - 2019 |
Event | 2018 IEEE Military Communications Conference, MILCOM 2018 - Los Angeles, United States Duration: 29 Oct 2018 → 31 Oct 2018 |
Conference
Conference | 2018 IEEE Military Communications Conference, MILCOM 2018 |
---|---|
Country/Territory | United States |
City | Los Angeles |
Period | 29/10/18 → 31/10/18 |
Bibliographical note
Green Open Access added to TU Delft Institutional Repository ‘You share, we take care!’ – Taverne project https://www.openaccess.nl/en/you-share-we-take-careOtherwise as indicated in the copyright section: the publisher is the copyright holder of this work and the author uses the Dutch legislation to make this work public.
Keywords
- Collateral damage
- Cyber operations
- Cyber warfare
- Cyber weapons
- Effects assessment
- Military advantage
- Targeting
Fingerprint
Dive into the research topics of 'Assessment Methodology for Collateral Damage and Military (Dis)Advantage in Cyber Operations'. Together they form a unique fingerprint.Projects
- 1 Active
-
Cybersecurity (TPM)
van Eeten, M. J. G., Hernandez Ganan, C., Gürses, F. S., van Wegberg, R. S., Parkin, S. E., Zhauniarovich, Y., van Engelenburg, S. H., Kadenko, N. I., Labunets, K., Akyazi, U., Bouwman, X. B., Jansen, B. A., Kaur, M., Al Alsadi, A., Lone, Q. B., Turcios Rodriguez, E. R., Vermeer, M., van Harten, V. T. C., Vetrivel, S., Oomens, E. (. C. )., Kustosch, L. F., Bisogni, F., Ciere, M., Fiebig, T., Korczynski, M. T., Moreira Moura, G. C., Noroozian, A., Pieters, W., Tajalizadehkhoob, S., Dacier, B. H. A., San José Sanchez, J., Çetin, F. O. & Zannettou, S.
1/01/10 → …
Project: Research