Skip to main content

Kinetic and Cyber

  • Chapter
  • First Online:
Cyber Defense and Situational Awareness

Part of the book series: Advances in Information Security ((ADIS,volume 62))

  • 2854 Accesses

Abstract

Although a fairly new topic in the context of cyber security, situation awareness (SA) has a far longer history of study and applications in such areas as control of complex enterprises and in conventional warfare. Far more is known about the SA in conventional military conflicts, or adversarial engagements, than in cyber ones. By exploring what is known about SA in conventional—also commonly referred to as kinetic—battles, we may gain insights and research directions relevant to cyber conflicts. For this reason, having outlined the foundations and challenges on CSA in the previous chapter, we proceed to discuss the nature of SA in conventional (often called kinetic) conflict, review what is known about this kinetic SA (KSA), and then offer a comparison with what is currently understood regarding the cyber SA (CSA). We find that challenges and opportunities of KSA and CSA are similar or at least parallel in several important ways. With respect to similarities, in both kinetic and cyber worlds, SA strongly impacts the outcome of the mission. Also similarly, cognitive biases are found in both KSA and CSA. As an example of differences, KSA often relies on commonly accepted, widely used organizing representation—map of the physical terrain of the battlefield. No such common representation has emerged in CSA, yet.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  • Alberts, D.S., (2002), Information Age Transformation: Getting to a 21st Century Military, Washington, D.C., Command and Control Research Program (CCRP) Publications.

    Google Scholar 

  • Alberts, D.S., Garstka, J.J., & Stein, F.P. (1999). Network Centric Warfare. Washington, D.C., Command and Control Research Program (CCRP) Publications.

    Google Scholar 

  • Alberts, D. S., & Hayes, R. E. (2003). Power to the Edge: Command and Control in the Information Age. Washington D.C., Command and Control Research Program (CCRP) Publications.

    Google Scholar 

  • Albrechtsen, Eirik, and Jan Hovden. “The information security digital divide between information security managers and users.” Computers & Security 28.6 (2009): 476-490.

    Article  Google Scholar 

  • Bowen, K.C. & McNaught, K.R, Mathematics in warfare: Lanchester theory, The Lanchester Legacy, Volume 3—A Celebration of Genious (N. Fletcher, ed.), Coventry University Press, Coventry, 1996.

    Google Scholar 

  • Cho, Hichang, Jae-Shin Lee, and Siyoung Chung. “Optimistic bias about online privacy risks: Testing the moderating effects of perceived controllability and prior experience.” Computers in Human Behavior 26.5 (2010): 987-995.

    Article  Google Scholar 

  • Dostal, B.C. (2007). Enhancing situational understanding through the employment of unmanned aerial vehicles. Interim Brigade Combat Team Newsletter, No. 01–18.

    Google Scholar 

  • Endsley, M. R. (1988). Design and evaluation for situation awareness enhancement. In Proceedings of the Human Factors Society, 32 (pp. 97-101). Santa Monica, CA: Human Factors Society.

    Google Scholar 

  • Endsley, M. R. (1995). Toward a theory of situation awareness in dynamic systems. Human Factors: The Journal of the Human Factors and Ergonomics Society, 37(1), 32-64.

    Article  Google Scholar 

  • Gantz, J., & Rochester, J. B. (2005). Pirates of the Digital Millennium. Upper Saddle River, NJ: Prentice Hall. ISBN 0-13-146315-2.

    Google Scholar 

  • Greitzer, Frank L., Thomas E. Carroll, and Adam D. Roberts. “Cyber Friendly Fire.” Pacific Northwest National Laboratory, Tech. Rep. PNNL-20821 (2011).

    Google Scholar 

  • Jain, A. (2005). Cyber Crime: Cyber crime: issues and threats (Vol. 2). Gyan Publishing House.

    Google Scholar 

  • Jajodia, Sushil, et al. “Cauldron mission-centric cyber situational awareness with defense in depth.” MILITARY COMMUNICATIONS CONFERENCE, 2011-MILCOM 2011. IEEE, 2011.

    Google Scholar 

  • Jakobson, G. (2011). Mission cyber security situation assessment using impact dependency graphs. Proceedings of the 14 th International Conference on Information Fusion (pp. 1-8).

    Google Scholar 

  • Julisch, Klaus. “Understanding and overcoming cyber security anti-patterns.” Computer Networks 57.10 (2013): 2206-2211.

    Article  Google Scholar 

  • Klein, Gabriel, et al. “Towards a Model-Based Cyber Defense Situational Awareness Visualization Environment.” Proceedings of the RTO Workshop “Visualising Networks: Coping with Chance and Uncertainty”. Rome, NY, USA. 2010.

    Google Scholar 

  • A. Kott, Raiding the Enemy’s Mind, Military Information Technology, Dec 29, 2007, Vol 11, Issue 11

    Google Scholar 

  • Kott, Alexander, ed. Battle of cognition: the future information-rich warfare and the mind of the commander. Greenwood Publishing Group, 2008.

    Google Scholar 

  • Kott, Alexander, et al. “Hypothesis-driven information fusion in adversarial, deceptive environments.” Information Fusion 12.2 (2011): 131-144.

    Google Scholar 

  • Kott, Alexander, and Curtis Arnold. “The promises and challenges of continuous monitoring and risk scoring.” Security & Privacy, IEEE 11.1 (2013): 90-93.

    Article  Google Scholar 

  • Moffat, J. “Mathematical Modeling of Information Age Conflict” Journal of Applied Mathematics and Decision Sciences (2006): 1-15.

    Google Scholar 

  • National Research Council. Network Science. Washington, DC: The National Academies Press, 2005.

    Google Scholar 

  • Nurse, Jason RC, et al. “Trustworthy and effective communication of cybersecurity risks: A review.” Socio-Technical Aspects in Security and Trust (STAST), 2011 1st Workshop on. IEEE, 2011.

    Google Scholar 

  • M. Ownby, and A. Kott, Reading the Mind of the Enemy: Predictive Analysis and Command Effectiveness, Command and Control Research and Technology Symposium, San Diego, CA, June 2006

    Google Scholar 

  • Rajivan, Prashanth, et al. “Effects of Teamwork versus Group Work on Signal Detection in Cyber Defense Teams.” Foundations of Augmented Cognition. Springer Berlin Heidelberg, 2013. 172-180.

    Google Scholar 

  • Rhee, Hyeun-Suk, Young U. Ryu, and Cheong-Tag Kim. “Unrealistic optimism on information security management.” Computers & Security 31.2 (2012): 221-2

    Article  Google Scholar 

  • Swan, J. and Hennig, J., From Data to Decisions. Army Acquisition, Logistics & Technology, January-March 2012.

    Google Scholar 

  • Tyworth, Michael, Nicklaus A. Giacobe, and Vincent Mancuso. “Cyber situation awareness as distributed socio-cognitive work.” SPIE Defense, Security, and Sensing. International Society for Optics and Photonics, 2012.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Alexander Kott .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Kott, A., Buchler, N., Schaefer, K.E. (2014). Kinetic and Cyber. In: Kott, A., Wang, C., Erbacher, R. (eds) Cyber Defense and Situational Awareness. Advances in Information Security, vol 62. Springer, Cham. https://doi.org/10.1007/978-3-319-11391-3_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-11391-3_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-11390-6

  • Online ISBN: 978-3-319-11391-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics