Cyber Operational Planning

  • Izzat Alsmadi


The process of collecting business, software, or information systems’ requirements in general and security requirements in particular can take different approaches, structured or unstructured. At the end of the requirements collection process or stage, we may have one or more examples of the following problems that trigger the need for a thorough evaluation or validation process:


  1. AcqNotes (2018) Test & evaluation overview.
  2. Alsmadi I, Burdwell R, Aleroud A, Wahbeh A, Al-Qudah MA, Al-Omari A (2018) Practical information security. Springer, BerlinCrossRefGoogle Scholar
  3. Arnold JT (2012) The shoreline: where cyber and electronic warfare operations coexist. BiblioScholarGoogle Scholar
  4. Balaish T (2017) Cyber soldiers: White-hat hackers, CBS News, 21 Aug 2017Google Scholar
  5. Barber DE, Alan Bobo T, Sturm KP (2015) Cyberspace operations planning: operating a technical military force beyond the kinetic domains. J Military Cyber Professionals Assoc 1(1)Google Scholar
  6. Barth TH, Horowitz SA, Kaye MF, Wu L (2015) Staffing Cyber Operations (Presentation). Institute For Defense Analyses, Alexandria, VAGoogle Scholar
  7. Bautista W (2018) Practical cyber intelligence: how action-based intelligence can be an effective response to incidents. Packt, BirminghamGoogle Scholar
  8. Buchanan B (2018) CWPC contingency wartime planning course, global securityGoogle Scholar
  9. Buczak AL, Guven E (2016) A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Commun Surveys Tutorials 18(2):1153–1176CrossRefGoogle Scholar
  10. Cho J-H, Alsmadi I, Xu D (2016) Privacy and social capital in Online Social Networks, Global Communications Conference (GLOBECOM), IEEE. pp 1–7. Accessed 12 Apr 2016Google Scholar
  11. CI Glossary – Terms & Definitions of Interest for DoD CI Professionals (2 May 2011), Deffense intelligence agency, Scholar
  12. CRS (2015) Cyber Operations in DOD Policy and Plans: Issues for Congress, Congressional Research Service, 7–5700,, R43848
  13. Cyber Operations Personnel Report (2011) Department of Defense, Report to the Congressional Defense CommitteesGoogle Scholar
  14. D’Aspremont J (2016) Cyber operations and international law: an interventionist legal thought. J Conflict Security Law 21(3):367–368CrossRefGoogle Scholar
  15. Dartnall R (2017) Intelligence preparation of the cyber environment.
  16. Defense Information Systems Agency (2016) DOD Cloud Computing Strategy Security Requirements Guide, Version 1, Release 2, Mar 18Google Scholar
  17. Deliberate and Crisis Action Planning (2007) A presentation.
  18. Department of Justice (2014) U.S. Charges Five Chinese Military Hackers for Cyber Espionage Against U.S. Corporations and a Labor Organization for Commercial Advantage, May 19.
  19. DoD (1994) Joint tactics, techniques and procedures for noncombat evacuation operations (Joint Report 3-07.51, Second Draft). Washington, DC: Department of DefenseGoogle Scholar
  20. DoD (2010) Joint publication 1-02, Department of Defense Dictionary of military and associated termsGoogle Scholar
  21. DoD (2011) DRRS Primer for Senior Leaders.
  22. DoD (2015) Cybersecurity test and evaluation guidebook, Version 1, dote.osd.milGoogle Scholar
  23. DoD (2018a) Department of Defense Readiness Reporting System (DRRS)Google Scholar
  24. DoD (2018b) Cybersecurity test and evaluation guidebook, Version 2. dote.osd.milGoogle Scholar
  25. FY16 Cybersecurity (2016) dote.osd.milGoogle Scholar
  26. GAO (2017) Defense cyber security, DOD’s monitoring of progress in implementing cyber strategies can be strengthened, GAO-17-512Google Scholar
  27. Goldsmith J (2010) Can we stop the cyber arms race? WASH POST, Feb 1, 2010, at A17Google Scholar
  28. Greene T (2017) U.S. military wants white-hat hackers to target its cyber security systems ‘Hack the Air Force’ invites vetted attackers to test its public web sites, network world. Accessed 27 Apr 2017Google Scholar
  29. Heckman KE, Stech FJ, Schmocker BS, Thomas RK (2015) Denial and deception in cyber defense. Computer 48:36–44. Scholar
  30. Hilfiker JL (2013) Responding to cyber attacks and the applicability of existing international law, United States Army War College.
  31. Holland R (2016) The OPSEC Opportunity. Accessed 31 May 2016
  32. Jakobson G (2011) Mission cyber security situation assessment using impact dependency graphs. In: Proceedings of the 14th International Conference on Information Fusion (FUSION), pp 1–8Google Scholar
  33. Joint Pub (1999) Joint task force planning guidance and procedures.
  34. Joint Publication 3-05.5 (1993) Joint special operations targeting and mission planning procedures. Accessed 10 Aug 1993Google Scholar
  35. Joint Publication 3-12 (2013) Cyberspace Operations, Joint Publication 3-12 (R). Accessed 5 Feb 2013.
  36. Joint Publication 3-12 (2018) Cyberspace operations Accessed 8 Jun 2018Google Scholar
  37. JOPP (2013) Joint operational planning process workbook, NWC 4111J, JMO Department, Naval War College, 1 July 2013 (With Chg1)Google Scholar
  38. Kick J (2014) Cyber exercise playbook. The MITRE Corporation, McLean, VAGoogle Scholar
  39. Klann G (2003) Crisis leadership: using military lessons, organizational experiences, and the power of influence to lessen the impact of chaos on the people you lead. Center for Creative Leadership, Greensboro, NCGoogle Scholar
  40. Kott A, Stoianov N, Baykal N, Moller A, Sawilla R, Jain P, Lange M, Vidu C (2015) Assessing Mission impact of cyberattacks: report of the NATO IST-128 Workshop, ARL-TR-7566, Dec 2015Google Scholar
  41. Kott A, Ludwig J, Lange M (2017) Assessing Mission impact of cyberattacks: toward a model-driven paradigm. IEEE Security Privacy 15(5):65–74. Scholar
  42. Kuusisto T, Kuusisto R, Roehrig W (2015) Situation understanding for operational art in cyber operations. 14th European conference on cyber warfare and security, ECCWSGoogle Scholar
  43. Lemay A, Knight S, Fernandez J (2014) Intelligence preparation of the cyber environment, finding the high ground in cyberspace. J Inform Warfare 13(3)Google Scholar
  44. Leyden J (2012) The ‘one tiny slip’ that put LulzSec chief Sabu in the FBI’s pocket Well, at least this’ll make a half decent movie, Accesssed 7 Mar 2012
  45. Lizotte M, Derbentseva N (2016) Collaborative understanding of complex situations A Toolbox for Multidisciplinary Collaboration (TMC), Defense Research and Development Canada Scientific Report DRDC-RDDC-2016-R057, April 2015Google Scholar
  46. Long A (2017) A cyber SIOP? Operational considerations for strategic offensive cyber planning. J Cybersecurity 3(1):19–28MathSciNetGoogle Scholar
  47. Magdalenski J (2016) Operations Security or Cybersecurity?
  48. Mahvi AJ (2018) Strategic offensive cyber operations: capabilities, limitations, and role of the intelligence community. In: Kosal M (ed) Technology and the intelligence community. Advanced sciences and technologies for security applications. Springer, ChamCrossRefGoogle Scholar
  49. Mead J, Kersha D (2016) Shaping defense science and technology in the maritime domain 2016–2026.
  50. Musman S, Temin A, Tanner M, Fox D, Pridemore B (2009) Evaluating the impact of cyber attacks on missions. MITRE, McLean, VAGoogle Scholar
  51. Musman S, Temin A, Tanner M, Fox D, Pridemore B (2010) Evaluating the impact of cyber attacks on missions. 5th international conference on information warfare and securityGoogle Scholar
  52. NATO (2013) Cooperative Cyber Defense Centre of Excellence (CCDCOE), ‘The Tallinn Manual’. Accessed 12 Sep 2013
  53. NATO (2016) Social media as a tool of hybrid warfare. NATO StratCOM COEGoogle Scholar
  54. Noel S, Ludwig J, Jain P, Johnson D, Thomas R, McFarland J, King B, Webster S, Tello B (2015) Analyzing mission impacts of cyber actions. In: Proceedings of the NATO IST-128 workshop on cyber attack detection. Forensics and Attribution for Assessment of Mission Impact, IstanbulGoogle Scholar
  55. OPSA (2018) Operational security professional’s association,
  56. Rid T (2013) Cyber war will not take place. Oxford University Press, New York, p 32Google Scholar
  57. Riddle BJ (2016) Army cyber structure alignment. Air University, Maxwell, AFB, ALGoogle Scholar
  58. Schmitt MN (2013) Tallinn manual on the international law applicable to cyber warfare. Cambridge University Press, New York, NY, pp 6–19CrossRefGoogle Scholar
  59. Schmitt MN (2017) Peacetime cyber responses and wartime cyber operations under international law: an analytical Vade Mecum. Har Nat Sec J 8:239–282Google Scholar
  60. Schulmeyer G (2008) Handbook of software quality assurance, 4th edn. Artech House, Norwood, MAGoogle Scholar
  61. Shakarian P, Shakarian J, Ruef A (2013) Introduction to cyber warfare. Elsevier, AmsterdamGoogle Scholar
  62. Spinuzzi MA (2007) CCIR for complex and uncertain environments. School of Advanced Military Studies, Leavenworth, KSGoogle Scholar
  63. Steiner H (2017) Cyber operations legal rules and state practice. Authority and control in International Humanitarian Law. Stockholm UniversityGoogle Scholar
  64. T&E Guide (1993) Test and evaluation management guide, defense systems management collegeGoogle Scholar
  65. Test Readiness Review (TRR), AcqNotes (2017)
  66. Theohary CA, Harrington AI (2015) Cyber Operations in DOD Policy and Plans: Issues for Congress. Congressional Research Service, Washington, DC. Accessed 25 Oct 2016
  67. U.S. Joint Chiefs of Staff (2015) “Cyberspace Operations” Joint Publication 3-12(R). US Joint Chiefs of Staff, Washington, DC. Accessed 3 Feb 2015Google Scholar
  68. Underwood K (2018) DHS builds mobile defenses. The cyber edge, July 1, 2018Google Scholar
  69. United States, Joint Chiefs of Staff (1997) DOD Dictionary of Military Terms and Associated Terms. Joint Publication 1-02. Washington, DC: JCSGoogle Scholar
  70. US Naval War College (2014) Maritime component commander guidebookGoogle Scholar
  71. Usrey J (2014), Changing personnel readiness reporting to measure capability, Army sustainmentGoogle Scholar
  72. Wrange P (2014) Intervention in National and Private Cyber Space and International Law. In: Ebbesson J, Jacobsson M, Klamberg MA (eds) International law and changing perceptions of security. Brill Academic, LeidenGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Izzat Alsmadi
    • 1
  1. 1.Texas A&M UniversitySan AntonioUSA

Personalised recommendations