Abstract
Cyber warfare is a contentious topic, with no agreement on whether this is a real possibility or an unrealistic extension of the physical battlefield. This article will not debate the validity and legality of the concept of cyber warfare, but will assume its existence based on prior research. To that end the article will examine research available on traditional warfare causes, elements and measurement techniques. This is done to examine the possibility of mapping traditional warfare measurements to cyber warfare. This article aims to provide evidence towards the probability of predicting and mapping traditional warfare measurements to the cyber warfare domain. Currently the only way of cyber warfare measurement is located in traditional information security techniques, but these measurements often do not adequately describe the extent of the cyber domain. Therefore, this paper aims to identify a set of criteria to aid in the prediction of cyber warfare probability.
Chapter PDF
References
Allodi, L., Massacci, F.: How CVSS is DOSsingyour patching policy and wasting your money (2013), http://media.blackhat.com/us-13/US-13-Allodi-HOW-CVSS-is-DOSsing-Your-Patching-Policy-Slides.pdf (accessed November 20, 2013)
Baten, J., Mumme, C.: Does inequality lead to civil wars? A global long-term study using anthropometrics indicators (1816-1999). European Journal of Political Economy 32, 56–79 (2013)
Boehme, R., Freiling, F.: On metrics and measurements in Dependability metrics: Advanced lectures. In: Eusgled, I., Freiling, F., Reussner, R. (eds.), pp. 7–13. Springer, Heidelberg (2008), doi: http://dx.doi.org/10.1007/978-3-540-68947-8_2
Carr, J.: Inside Cyber Warfare. O’Reilly Media, Sebastopol (2011)
Christey, S., Martin, B.: Buying into the bias: Why vulnerability statistics suck (2013), http://attrition.org/security/conferences/2013-07-BlackHat-Vuln_Stats-draft_22-Published.pptx (accessed November 18, 2013)
Delany, C.: Online Politics: The Tools and Tactics of Digital Political Advocacy (2011), www.epolitics.com (accessed October 8, 2013)
Espinahara, J., Eduardo, L.: Lost in translation (2013), http://conference.hitb.org/hitbsecconf2013kul/materials/D2T3%20-%20Luiz%20Eduardo%20and%20Joaquim%20Espinhara%20-%20Lost%20in%20Translation.pdf (accessed November 20, 2013)
Filiol, E.: Operational aspects of cyberwarfare or cyberterrorist attacks: What a truly devastating attack could do. In: Ryan, J. (ed.) Leading Issues in Information Warfare & Security Research, vol. 1, pp. 35–53. Academic Publishing, Reading (2011)
Hathaway, M.: Cyber readiness index 1.0 (2013), http://belfercenter.hks.harvard.edu/files/cri-methodology-1-point-0-final.pdf (accessed November 21, 2013)
Heickerö, R.: Some aspects on cyber war faring in information arena and cognitive domain (2007), http://www.dodccrp.org/events/11th_ICCRTS/html/presentations/157.pdf (accessed November 25, 2013)
Internet World Stats. 2013. Internet usage statistics - The internet big picture (2013), http://www.internetworldstats.com/stats.htm (accessed October 29, 2013)
Kassim, S.: Twitter revolution: How the Arab Spring was helped by social media (2012), http://www.policymic.com/articles/10642/twitter-revolution-how-the-arab-spring-was-helped-by-social-media (accessed October 9, 2013)
Knapp, K., Boulton, W.: Cyber-Warfare Threatens Corporations: Expansion into Commercial Environments. Information Systems Management 23(2), 76–87 (2006)
Liles, S., Rogers, M., Dietz, J., Larson, D.: Applying traditional military principles to cyber warfare (2012), http://www.ccdcoe.org/publications/2012proceedings/3_2_Liles&Dietz&Rogers&Larson_ApplyingTraditionalMilitaryPrinciplesToCyberWarfare.pdf (accessed November 25, 2013)
Mandiant. Exposing One of China’s Cyber Espionage Units (2013), http://intelreport.mandiant.com/Mandiant_APT1_Report.pdf (accessed November 19, 2013)
MITRE. By Cyber Security Area (2012), http://measurablesecurity.mitre.org/directory/areas/index.html (accessed November 29, 2013)
Oxford Dictionaries. Cyberwar, http://www.oxforddictionaries.com/definition/english/cyberwar (accessed November 22, 2013)
Pew Research. The role of social media in the Arab uprisings (2012), http://www.journalism.org/2012/11/28/role-social-media-arab-uprisings/ (accessed October 9, 2013)
Rid, T.: Cyber war will not take place. Journal of Strategic Studies 35(1), 5–32 (2012)
Schreier, F.: ND. On cyberwarfare. DCAF Horizon 2015 Working Paper No. 7
Symantec. Internet Security Threat Report (ISTR), vol. 18, http://www.symantec.com/content/en/us/enterprise/other_resources/b-istr_main_report_v18_2012_21291018.en-us.pdf (accessed November 30, 2013)
UNICRI. ND. Cyberwarfare, http://www.unicri.it/special_topics/cyber_threats/cyber_crime/explanations/cyberwarfare/ (accessed November 22, 2013)
Van Evera, S.: Causes of war: Power and the roots of conflict. Cornell University Press, New York (1999)
Van Niekerk, B., Maharaj, M.: The Information Warfare Life Cycle Model. SA Journal of Information Management 13(1), Art. 476 (2011)
Verizon. The 2013 Data Breach Investigations Report (2013), http://www.verizonenterprise.com/resources/reports/rp_data-breach-investigations-report-2013_en_xg.pdf (accessed November 18, 2013)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 IFIP International Federation for Information Processing
About this paper
Cite this paper
Grobler, M., Swart, I. (2014). On the Probability of Predicting and Mapping Traditional Warfare Measurements to the Cyber Warfare Domain. In: Kimppa, K., Whitehouse, D., Kuusela, T., Phahlamohlaka, J. (eds) ICT and Society. HCC 2014. IFIP Advances in Information and Communication Technology, vol 431. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-44208-1_20
Download citation
DOI: https://doi.org/10.1007/978-3-662-44208-1_20
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-44207-4
Online ISBN: 978-3-662-44208-1
eBook Packages: Computer ScienceComputer Science (R0)