On Operational-Level Cybersecurity Strategy Formation

ABSTRACT

An operational-level cybersecurity strategy formation reveals ways of figuring out an optimal sequence of the most efficient and effective actions that may lead to the success of a cyber operation. Unfortunately, it is not well explored. This paper proposes a new operational-level cybersecurity-strategy-formation framework, which is capable of linking various strategies together in a systematic and consolidated way so that the most optimal and effective solution can be quickly selected. This paper also evaluates the proposed approach and suggests areas for further study.


AUTHORS

Photo of Dr. Jim Q. Chen

National Defense University Fort McNair, Washington, D.C., U.S.
United States

Dr.Jim Q. Chen is a Professor of Cyber Studies in the College of Information and Cyberspace at the National Defense University in Washington, D.C., U.S. His expertise is in cyber warfare,cyber deterrence,cyber strategy, cyber-security technology, artificial intelligence, and machine learning. He has published widely on these topics.

DOD National Defense University,
United States

Professor Gil Duvall is Chair of the Cyber Information and Integration Operations Department of The National Defense University iCollege and directs the Cyber Concentration Program for the university. His expertise is in information security engineering architecture and critical infrastructure protection, and he is a recognized systems security management expert.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Quick Links

View the latest issue of JIW.

Latest Edition

Purchase a subscription to JIW.

Subscribe

Media Parner to JIW.

Media Partner

Keywords

C

C2
C2S
CDX
CIA
CIP
CPS

I

IA
ICS

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

  • Journal of Information Warfare
    114 Ballard Street
    Yorktown, VA
    23690
  • 757.234.6664
  • jiw@gbpts.com