Retrospective Evaluation of Cyber-security Strategic Reports for the Next Two Decades: From 2000 to 2030

ABSTRACT

Retrospective taxonomical evaluation of the strategic cyber-security reports of the last decade is important to appreciate how the very concept of Cyberspace has evolved along with other important concepts and definitions such as cyber security, cyber terrorism, cyber warfare, and information warfare. For that reason, this paper first evaluates, compares, and contrasts seven cyber-security strategy reports covering the decade from 2002 to 2011. Secondly, armed with the strategic cyber-security reports of the last decade, the paper attempts to ascertain whether the near future cyber-security strategies will continue to be valid.


AUTHORS

Department of Computer Engineering College of Engineering,Yasar University
Turkey

Dr. Koltuksuz earned both his Master’s Degree (1989) and his Ph.D. (1995) from the Computer Engineering Department at Aegean University and was subsequently appointed Assistant Professor. In 1996, he moved to the Department of Computer Engineering at Izmir Institute of Technology, where he became a tenured Associate Professor in 1999. Dr. Koltuksuz established and ran the Information Systems Strategy and Security Laboratory (IS3 Lab) in Iztech. He joined the department of Computer Engineering at the College of Engineering of Yaşar University in September 2009 and is now department head. In the fall of 2012, Dr. Koltuksuz also initiated the Cyber Security Graduate level program and is currently directing it. His research interests include Cryptology, Theory of Numbers, Information Theory, Theory of Computation, Operating Systems, Multicore Architectures, Cyberspace Defense and Security, Open Sources Intelligence Analysis, and Computer Forensics

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Quick Links

View the latest issue of JIW.

Latest Edition

Purchase a subscription to JIW.

Subscribe

Keywords

A

AI
APT

C

C2
C2S
CDX
CIA
CIP
CPS

D

DNS
DoD
DoS

I

IA
ICS

M

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

Registered Agent and Mailing Address

  • Journal of Information Warfare
  •  ArmisteadTEC
  • Dr Leigh Armistead, President
  • 1624 Wakefield Drive
  • Virginia Beach, VA 23455

 757.510.4574

 JIW@ArmisteadTec.com