Analysis of Cyber Security Methodologies: A Direct Comparison of Current Versus Possible DoD Cyber Assets

  • Sai Kumar
  • Vikram Mittal

Abstract

Recent years and modern warfare have shown an increasing reliance on the cyber domain to maintain national and military operability, resulting in cyber exploits having a more profound impact on victim nations. As the United States seeks to maximize its ability to capitalize on these exploits and minimize its susceptibility, a decision must be made on the most effective way to accomplish these tasks. Currently, each major department within the Department of Defense (DoD) are methodically building up their own cyber assets to accomplish these tasks as they relate to their traditional domain. There has been a recent proposal to do away with this system structure and instead create a separate Cyber Department, on the same level as the Army, Navy, etc. This paper evaluates the comparative value between the two proposals through value modeling. The value model is based on each alternative’s ability to achieve the end state cyber goals of the DoD and the nation as a whole. Strong indicators point towards a separate Cyber Department as the most valuable alternative available to achieve the nation’s goals, and that there are current weaknesses within our current cyber structure that are open for exploitation.

References

Albury, D. (2005). Fostering Innovation in Public Services. Public Money And Management, 25(1), 51-56.

Amadeo, K. (2018). 5 U.S. GDP Statistics You Need to Know. The Balance. Retrieved 8 March 2018, from https://www.thebalance.com/u-s-gdp-5-latest-statistics-and-how-to-use-them-3306041

Army Air Forces - United States Army Aviation. (2018). Army.mil. Retrieved 8 March 2018, from https://www.army.mil/aviation/airforces/index.html

Attar, A. (2017). 10 Highly Powerful Air Forces in the World (2018 Ranking). ListoGraphic. Retrieved 8 March 2018, from http://listographic.com/10-powerful-air-force

Barno, D., & Bensahel, N. (2017). Three Things the Army Chief of Staff Wants You to Know. War on the Rocks. Retrieved 8 March 2018, from https://warontherocks.com/2017/05/three-things-the-army-chief-of-staff-wants-you-to-know/

Choucri, N., Madnick, S., & Ferwerda, J. (2013). Institutions for Cyber Security: International Responses and Global Imperatives. Information Technology For Development, 20(2), 96-121. http://dx.doi.org/10.1080/02681102.2013.836699

Commons, A. (2018). Cyber is the New Air Domain Superiority in the Megacity. Military Review. Retrieved from http://www.armyupress.army.mil/Journals/Military-Review/English-Edition-Archives/January-February-2018/cyber-is-the-New-Air-Domain-Superiority-in-the-Megacity/

Cox, M. (2018). Army to Stress More Emergency-Deployment Training in 2018. Military.com. Retrieved 8 March 2018, from https://www.military.com/daily-news/2018/02/13/army-stress-more-emergency-deployment-training-2018.html

Cyber Incident Response: What Is It, And Why Do You Need It? - Securonix. (2017). Securonix. Retrieved 25 March 2018, from https://www.securonix.com/cyber-incident-response/

Department of Defense. (2018). Summary of the National Defense Strategy of The United States of America (p. 1). United States of America.

Greenberg, A. (2017). How An Entire Nation Became Russia's Test Lab for Cyberwar. WIRED. Retrieved 8 March 2018, from https://www.wired.com/story/russian-hackers-attack-ukraine/

Hammons, M. (2016). The Origin of the U.S. Air Force - VeteranAid. VeteranAid. Retrieved 8 March 2018, from https://www.veteranaid.org/blog/2016/04/12/the-origin-of-the-u-s-air-force/

Hermes, W. (2001). American Military History (pp. 591-619). United States Army. Retrieved from https://history.army.mil/books/AMH/AMH-27.htm

Kilcarr, S. (2016). Survey says corporate cyber response still too slow. Fleet Owner. Retrieved 25 March 2018, from http://www.fleetowner.com/blog/survey-says-corporate-cyber-response-still-too-slow

Koppel, T. (2015). Lights out (pp. 121-126). New York: Broadway Books.

Langner, R. (2011). Stuxnet: Dissecting a Cyberwarfare Weapon. IEEE Security & Privacy Magazine, 9(3), 49-51. http://dx.doi.org/10.1109/msp.2011.67

Lee, R., Assante, M., & Conway, T. (2016). Analysis of the Cyber Attack on the Ukrainian Power Grid. Electricity Information Sharing And Analysis Center, v-vi. Retrieved from https://ics.sans.org/media/E-ISAC_SANS_Ukraine_DUC_5.pdf

McCarthy, T. (2018). Does the US really need a huge boost in military spending?. The Guardian. Retrieved 8 March 2018, from https://www.theguardian.com/us-news/2018/feb/09/senate-budget-deal-us-military-spending

Pomerleau, M. (2017a). Army, Navy Cyber teams say they’re ready to go ... a year early. Fifth Domain. Retrieved 8 March 2018, from https://www.fifthdomain.com/dod/2017/11/02/army-navy-cyber-teams-say-theyre-ready-to-go-a-year-early/

Pomerleau, M. (2017b). DoD still working toward CYBERCOM elevation. Fifth Domain. Retrieved 8 March 2018, from https://www.fifthdomain.com/dod/cybercom/2017/10/16/dod-still-working-toward-cybercom-elevation/

Richardson, G. (2012). The United States Army’s Current Capability to Conduct Combined Arms Maneuver (pp. 37-49). Fort Leavonworth, Kansas: United States Army Command and General Staff College.

Stavridis, J., & Weinstein, D. (2014). Time for a U.S. Cyber Force. Proceedings Magazine, (140). Retrieved from https://www.usni.org/magazines/proceedings/2014-01/time-us-cyber-force

Sullivan, J., & Kamensky, D. (2017). How cyber-attacks in Ukraine show the vulnerability of the U.S. power grid. The Electricity Journal, 30(3), 30-35. http://dx.doi.org/10.1016/j.tej.2017.02.006

Timeline of Army Cyber. (2017). goarmy.com. Retrieved 8 March 2018, from https://www.goarmy.com/army-cyber/timeline-of-army-cyber.html

U.S. Army Cyber Command. (2016). Integration of cyberspace capabilities into tactical units. www.army.mil. Retrieved 8 March 2018, from https://www.army.mil/article/163156/integration_of_cyberspace_capabilities_into_tactical_units

U.S. Army Cyber Command | The U.S. Army. (2018). www.army.mil. Retrieved 26 March 2018, from https://www.army.mil/armycyber#org-about

Zetter, K. (2014). An Unprecedented Look at Stuxnet, the World's First Digital Weapon. WIRED. Retrieved 8 March 2018, from https://www.wired.com/2014/11/countdown-to-zero-day-stuxnet/

Published
2019-03-07
How to Cite
Kumar, S., & Mittal, V. (2019). Analysis of Cyber Security Methodologies: A Direct Comparison of Current Versus Possible DoD Cyber Assets. Industrial and Systems Engineering Review, 6(2), 101-108. Retrieved from http://watsonojs.binghamton.edu/index.php/iser/article/view/96