Paper Critique
The US military joint doctrine describes the cyber operations as the operations that can be used to focus on powers by the implementation of force by using the cyberspace (Gellman and Nakashima 2013). Cyber space is nothing but a virtual computer world. It is used to generate a global computer network that is used to perform online communication (Blowers and Williams 2014). The main feature of the cyberspace is an interactive and virtual framework for a large range of participants. It is used to share the information, transfer ideas, plays games and many others. Computer Network Operations are intentional operations to optimize the networks (Barrett 2013). In this report an article review is performed based on the Manoeuvre Warfare Utilizing Cloud Resources. This report discusses the Manoeuvre operations principles. It also elaborates regarding the cyber operations in modern environment.
The author mentions that technology is a driving force in human society. Internet enhances the lifestyle of the people (Barrett 2013). When it is related to cyberspace, security is a big deal. At the present stage, new technologies are implemented. Information security should be proactive. At present scenario it becomes offensive. Techniques and methods are available in the virtual world. The author mentions that threat is a human being to cause damage or danger. Three keywords are involved in this particular case. These include human being, material and damage. The threat agent is used to express an individual or group that is utilised to clear the threats. These threats are not concerned with the information gain. The author mentions in detail regarding Information and Manoeuvre Warfare (Blowers and Williams 2014). In this paper the Psychological Operations are discussed. It is elaborated as planned operations to deliver specified information. The entire of Psychological Operations is to try and influence the people. In this paper the author discusses regarding the Operational Security, Military Deception and Cloud Resources (Gellman and Nakashima 2013). As per the NIST model there are different kinds of cloud resources. These include Public, Private, Hybrid and Community. It also discusses the Infrastructure as a Service, Platform as a Service and Software as a Service.
In this paper, the author does not discuss the disadvantages of cloud computing. This paper does not provide any idea regarding the advantages of Cybersecurity and cyber operations (Jun, LaFoy and Sohn 2016). In this paper the author does not discuss regarding the deception strategy and its methodologies in detail.
Manoeuvre operations principles
Cyber Maneuver is the implementation to capture, disrupt, degrade, deny and manipulate the computing as well as information resources to reach to the position of advantages concerning the competitors. It generally relates to the transfer of military forces and the implementation of fires (Junio 2013). In cyberspace, there is no transfer of forces in the kinetic sense. It is a virtual platform. It is related to the implementation of forces to some exact points of attack. It is a special code to detect the purpose of the attackers. Forces are not able to move in the cyberspace. It is responsible for making the observation very complicated. Cyber Maneuver is used to influence the machine as well as human behaviour. It is a redundant statement. The basic goal of the influencing machine behaviour is to influence human behaviour. There are no open, state-to-state cyber wars. It is a fixed state of conflict between different states (Kallberg 2013). International laws are not strong enough for cyber warfare. It is quite obvious that the state will grip this issue to take steps in the cyberspace.
The Cyber Operation Mission Area is modifying the upcoming warfare by using cyber operations (Roscini 2014). It is used to focus on providing assurance of the targets of the Department of Defense and providing the major solutions to give authorisation for intelligence and military operations (Jun, LaFoy and Sohn 2016). It is used to develop the systems that underpin the operational capabilities in the cyberspace. At Trident Warrior, Engineers develops new wireless technology. They developed the next-generation secure mobile networking technology for wireless communication. It acts between the gadgets using the light to transmit and position (Barrett 2013). The military develops Li-Fi for providing the secured high-data-rate communications for vehicles, facilities and submarines (Schmitt 2017). The Navy of United States of America wants to observe the effects of shock and vibration occurred due to the wireless link. They design the custom mounts to install commercial Li-Fi inside the laboratory. But this gadget is failed in the extreme testing at APL.
The Naval Academy of USA waits to inaugurate the centre of cyber studies. The expenditure is dollar one hundred twenty million (Roscini 2014). They will provide the education facility and state-of-art training. Several persons will gain a huge amount of knowledge related to the real time Cybersecurity (Kallberg 2013). Three midshipmen will get an outstanding opportunity to share their work in the Navy Cyber Forum Laboratory. A Senior Subject Matter Expert from APL conducts training on cyber-related problems. They perform an outstanding job by providing many cyber operations projects (Kallberg 2013). Among the midshipmen, there are many college students who are working as an intern in APL. The numbers of interns are increasing exponentially (Gellman and Nakashima 2013). In this summer there are thirty-eight students from the Naval Academy. Two cadets of USA Military academy also join in this internship at West Point.
Conclusion
Cyber Security and Cyber Operations result from the inherent character of information technology. There are lots of threats that are involved in cyber operations as well as Cybersecurity. There are new methodologies that are used to terminate the older threats. The attacker develops new technologies and methodologies to hamper the security of cyber operations. It reflects a static picture in the Cybersecurity methodology in United States. There are several IT vendors who are providing tremendous effort to improve the security of cyber operation. At the end it is concluded that cyber operations and Cybersecurity are very important in the current era.
References
Barrett, E.T., 2013. Warfare in a new domain: The ethics of military cyber-operations. Journal of Military Ethics, 12(1), pp.4-17.
Blowers, M. and Williams, J., 2014. Machine learning applied to cyber operations. In Network science and cybersecurity (pp. 155-175). Springer, New York, NY.
Gellman, B. and Nakashima, E., 2013. US spy agencies mounted 231 offensive cyber-operations in 2011, documents show. The Washington Post, 30.
Jun, J., LaFoy, S. and Sohn, E., 2016. North Korea’s cyber operations: Strategy and responses. Rowman & Littlefield.
Junio, T.J., 2013. How probable is cyber war? Bringing IR theory back in to the cyber conflict debate. Journal of Strategic Studies, 36(1), pp.125-133.
Kallberg, J., 2013. Cyber Operations–Bridging from Concept to Cyber Superiority. Joint Forces Quarterly, (68).
Roscini, M., 2014. Cyber operations and the use of force in international law. Oxford University Press, USA.
Schmitt, M.N. ed., 2017. Tallinn manual 2.0 on the international law applicable to cyber operations. Cambridge University Press.