10.07.2015 Views

On the Use of Offensive Cyber Capabilities - Belfer Center for ...

On the Use of Offensive Cyber Capabilities - Belfer Center for ...

On the Use of Offensive Cyber Capabilities - Belfer Center for ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

distinctions <strong>for</strong> policy-making. To rectify this issue, we have developed <strong>the</strong>following ontology based on a hierarchy <strong>of</strong> three criteria.1) Target <strong>of</strong> <strong>the</strong> cyber operation: based on ownership <strong>of</strong> affected networks2) Effect <strong>of</strong> <strong>the</strong> operation: by type (logical or physical) and degree (minimalto use <strong>of</strong> <strong>for</strong>ce)3) Objective <strong>of</strong> <strong>the</strong> operation: whe<strong>the</strong>r in<strong>for</strong>mational, <strong>of</strong>fensive or defensiveUsing this system, it is clear that current classifications <strong>of</strong> <strong>of</strong>fensive cyberoperations are overly broad, applying actually to external cyber operations.Given this distinction, we provide a detailed examination <strong>of</strong> external cyberoperations as shown in Figure 1. Within this ontology, we have identified eleventypes <strong>of</strong> external cyber actions, and have conducted detailed analyses <strong>of</strong> six: 1)Scanning, 2) Intrusion, 3) In<strong>for</strong>mation Collection, 4) <strong>Cyber</strong> Attack, 5)Counterattack, and 6) <strong>Cyber</strong> Force.Figure 1: External <strong>Cyber</strong> Actions <strong>On</strong>tology (underlined subject to detailed analysis)5

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!