Developing a Military Cyber Maturity Model for Multi-Domain Battle Mission Resilience and Success

Developing a Military Cyber Maturity Model for Multi-Domain Battle Mission Resilience and Success

David Ormrod, Benjamin Turnbull
Copyright: © 2017 |Volume: 7 |Issue: 4 |Pages: 13
ISSN: 1947-3435|EISSN: 1947-3443|EISBN13: 9781522514084|DOI: 10.4018/IJCWT.2017100101
Cite Article Cite Article

MLA

Ormrod, David, and Benjamin Turnbull. "Developing a Military Cyber Maturity Model for Multi-Domain Battle Mission Resilience and Success." IJCWT vol.7, no.4 2017: pp.1-13. http://doi.org/10.4018/IJCWT.2017100101

APA

Ormrod, D. & Turnbull, B. (2017). Developing a Military Cyber Maturity Model for Multi-Domain Battle Mission Resilience and Success. International Journal of Cyber Warfare and Terrorism (IJCWT), 7(4), 1-13. http://doi.org/10.4018/IJCWT.2017100101

Chicago

Ormrod, David, and Benjamin Turnbull. "Developing a Military Cyber Maturity Model for Multi-Domain Battle Mission Resilience and Success," International Journal of Cyber Warfare and Terrorism (IJCWT) 7, no.4: 1-13. http://doi.org/10.4018/IJCWT.2017100101

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Modern military forces rely heavily on cyber-enabled systems; for logistics, communication, and control. Modern military platforms are heavily integrated with computing capability. This integration and reliance will only increase over time. Modern military operations require the support of flexible, responsive and resilient cyber-capabilities. Current information system security models and information assurance constructs seek to achieve information assurance, a high degree of certainty in the confidentiality, integrity and availability of cyber-systems supporting combat operations. However, this approach assumes that an information assurance approach is a complete and comprehensive defense. History though, has proven otherwise. This work argues that the information assurance approach, whilst a worthy goal, is not reflective of the lessons of history or warfare. Specifically, this work outlines the need for, and introduces The Military Cyber-Maturity Model, a pragmatic model that assumes a technically capable and intelligent adversary. This model assumes the possibility of an adversary utilizing an unknown vulnerability to attack the system, and expends resources to minimise the impact of the successful attack rather than relying entirely on an impregnable defense. This approach extends beyond the assumption that a cyber-attack immediately causes mission failure, by recognizing that each cyber-attack has different requirements and outcomes and will affect different assets and processes. The Military Cyber-Maturity Model seeks to model business continuity through a high degree of cultural change, embedded work practices that parallel analogue and digital work practices with deceptive counterintelligence behavior. The Military Cyber-Maturity Model incorporates the concepts of behavioral defense and mission assurance to provide agility and increase the likelihood of success in combat. Information deception provides a behavioral defense, creating uncertainty and doubt in the adversary's mind and reducing the degree of trust they have in the information available. This paper introduces the model, outlines its aims, components and justifications. This work also outlines the need for simulation and testing to validate the model's effectiveness, and introduces a number of potential use-cases.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.