Abstract
This chapter presents a quick overview about the existing cyber Defence capabilities and cyber ranges in complex networks where operations testbeds meant to bring improvements in cyber security training. The current chapter gives a brief on the problem area where cyber developments within the Ministry of Defence (MoD) are introduced along with the test range. The research goal is introduced as well as the study limitations and desired results. The chapter ends with some recommendations and suggestions that the researcher came up with based on the results of the study for complex networks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Ottis, Rain and Lorents, Peeter. 2010. Cyberspace: Definitions and Implications. In 5th international conference on information warfare and security, (Dayton OH, US: Cooperative Cyber Defence Centre of Excellence).
Wiener, Norbert. 1948. Cybernetics: Or control and communication in the animal and the machine. Cambridge: The MIT Press.
Thill, Scott. March 17, 1948: William Gibson. 2011. Father of Cyberspace. Wired.com. March 2011. http://www.wired.com/thisdayintech/2011/03/0317cyberspace-author-william-gibson-born/.
Kuehl, Dr Dan. 2009. From Cyberspace to Cyberpower: Defining the Problem. [book auth.] Stuart H. Starr, and Larry K. Wentz Franklin D. Kramer. Cyberpower and National Security. s.l.: Potomac Books, Inc., Vols. in Cyberpower and National Security, ed. Franklin D. Kramer, Stuart H. Starr, and Larry K. Wentz.
Cornish, Paul, David Livingstone, Dave Clemente, and Claire Yorke. 2010. On cyber warfare. London: Chatham House. November.
Andress and Winterfeld. 2011. Cyber warfare; techniques, tactics and tools for security practitioners. New York: Elsevier.
US Department of Defence. The National Military Strategy for Cyberspace Operations. December 2006.
Ministry of Security and Justice. Cyber Security Beeld Nederland. December June 2012. CSBN-2.
US Department of Defence. Joint Publication 3-0, Joint Operations. August 2011.
NATO. Allied Joint Doctrine for Information Operations. November 2009. AJP 3.10.
Mirkovic, Jelena, et al. 2010. The DETER project: Advancing the science of cyber security experimentation and test. IEEE. 978-1-4244-6048-9/10.
West-Brown, et al. Handbook for computer security incident response teams (CSIRTs). (New York: Carnegie Mellon University, 2003). CMU/SEI-2003-HB-002.
Benzel, et al. 2007. Design, Deployement and Use of the DETER Testbed. In DETER community workshop on cyber-security and test, Boston, August 2007.
NC3A. 2010. Cyber Defence Capability Framework. December 2010.
BuxBaum, Peter A. 2011. Building a Better ’Cyber Range’. August 2011.
Sabo, Robert P. 2006. Standing Up the Information Operations Range. 2006.
Powell, Robert, Holmes, Timoty K. and Pie, Cesar E. 2010. The information assurance range. ITEA Journal 31: 473–477.
UK Ministry of Defence. Defence Minister opens UK cyber security test range. Ministry of Defence. http://www.mod.uk/DefenceInternet/DefenceNews/DefencePolicyAndBusiness/DefenceMinisterOpensUkCyberSecurityTestRange.htm.
US Department of Defence. 2009. The Global Information Grid (GIG) 2.0. Concept of Operations. March 2009. Version 1.1.
Watson. Combat Readiness through Resilience in Hostile Cyber Environments.
Welshans. 2010. History of cyber testing and evaluation - A voice from the front lines. ITEA Journal 31: 449–452.
Benzel, et al. 2009. Current Developements in DETER Cybersecurity Testbed Technology.
DARPA. National Cyber Range. http://www.darpa.mil/Our_Work/STO/Programs/National_Cyber_Range_(NCR).aspx.
Defence Information Systems Agency. Department of Defence Information Assurance Range: A Venue for Test and Evaluation in Cyberspace. August 2011.
NATO Cooperative Cyber Defence Centre of Excellence. CCD COE Training Courses -CCD COE. http://www.ccdcoe.org/236.html.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
Ionicǎ, D., Popescu, N., Popescu, D., Pop, F. (2018). Cyber Defence Capabilities in Complex Networks. In: Di Martino, B., Li, KC., Yang, L., Esposito, A. (eds) Internet of Everything. Internet of Things. Springer, Singapore. https://doi.org/10.1007/978-981-10-5861-5_10
Download citation
DOI: https://doi.org/10.1007/978-981-10-5861-5_10
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-5860-8
Online ISBN: 978-981-10-5861-5
eBook Packages: EngineeringEngineering (R0)