Skip to main content
Erschienen in:
Buchtitelbild

2015 | OriginalPaper | Buchkapitel

Cyberspace Resiliency: Springing Back with the Bamboo

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Rigid cyberspace defenses are proving unable to meet advanced and modern cyberspace threats. As a result, there has been increasing focus and interest in cyber resiliency; but what will it take to be resilient in future cyber combat? We can glean some useful concepts from the ancient Japanese proverb about the resiliency of bamboo in a storm. In comparison with the massive oak, which relies on structural strength, three characteristics enable the bamboo’s greater resiliency. Bamboo has the ability to accept deformation without failure, a significantly reduced attack surface, and dynamically reacts to the wind in a way that minimizes the impact of future gusts. Defenders of cyberspace should look to add similar characteristics to their cyberspace systems. First, cyberspace defenders should maximize the flexibility of their systems by deliberately building in “inefficient” excess capacity, planning for and expecting failure, and creating personnel flexibility through training and exercises. Second, defenders should reduce their attack surface by eliminating unnecessary capability in both hardware and software, resist users’ desire for continual rapid improvements in capability without adequate security testing, and segment their networks and systems into separate defended enclaves. Finally, cyber defenders should position themselves to dynamically respond to attacks through improved situational awareness, effective cyberspace command and control, and active defenses. Combining these approaches will enable the defenders of cyberspace systems to weather cyberspace attacks and spring upright after the passage of the storm.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
Risk Steering Committee [1].
 
2
Singer and Friedman have recently suggested that the classic information security “CIA Triad” of Confidentiality, Integrity, and Availability should be extended to include resilience [2], Kindle Location 720.
 
3
Analysts were convinced that the offense was overwhelmingly powerful in the air domain based on several factors. One was that pursuit aircraft only had a slight speed advantage over bomber aircraft and took so long to get to altitude that the bombers would be gone before pursuit aircraft could engage them. A second was that bomber aircraft would be able to defend themselves with their own defensive firepower. Both ideas turned out to be wrong. Fighter aircraft developed a significant speed advantage over contemporary bomber aircraft, and radar as well as better command and control greatly enhanced their capability to intercept bombers and get to altitude before the bombers arrived. Additionally, the bombers were much less able to defend themselves than expected because defensive gunners turned out to be less effective than analysts had predicted.
 
4
Libicki [3].
 
5
Bryant [4], 171.
 
6
Bryant [4], 172.
 
7
Joint Chiefs of Staff [5].
 
8
Luttwak [6].
 
9
Aristotle [7].
 
10
Rosenzweig [8], Kindle Location 3727.
 
11
Bousquet [9], 222.
 
12
Bousquet [9], 222.
 
13
Rattray [10], Kindle Location 220.
 
14
Lonsdale [11].
 
15
General James E. Cartwright, USMC, comments at Air Force Association Air Warfare Symposium, February 8, 2007, reported in Kramer [12].
 
16
Rosenzweig [8], Kindle Location 815, chap. 3.
 
17
Rattray [10], Kindle Location 219.
 
18
Libicki [13].
 
19
Hostage and Broadwell [14].
 
20
Owens et al. [15], 84.
 
21
Carr [16].
 
22
Libicki [17], 37.
 
23
Bryant [4], 171.
 
24
Libicki [17], 74.
 
25
Clausewitz [18], 75.
 
26
Clausewitz [18], 357.
 
27
Owens et al. [15], 13.
 
28
Owens et al. [15], 13.
 
29
Rosenzweig [8], Kindle Location 2024, chap. 7.
 
30
Higgins [19].
 
31
Gray [20], 35.
 
32
O’Harrow [21].
 
33
Owens et al. [15], 125.
 
34
Libicki links the replicability of cyberspace with its reparability in Libicki [17], 5.
 
35
Singer and Friedman [2], Kindle Location 3177.
 
36
Rattray [22], 256.
 
37
Libicki [13], 324.
 
Literatur
2.
Zurück zum Zitat Singer PW, Friedman A (2013) Cybersecurity and cyberwar: what everyone needs to know. Oxford University Press, Amazon, Kindle Location 720 Singer PW, Friedman A (2013) Cybersecurity and cyberwar: what everyone needs to know. Oxford University Press, Amazon, Kindle Location 720
3.
Zurück zum Zitat Libicki MC (2009) Cyberdeterrence and cyberwar. RAND Corporation, Santa Monica, p 176 Libicki MC (2009) Cyberdeterrence and cyberwar. RAND Corporation, Santa Monica, p 176
4.
Zurück zum Zitat Bryant WD (2015) International conflict and cyberspace superiority: theory and practice. Routledge, London Bryant WD (2015) International conflict and cyberspace superiority: theory and practice. Routledge, London
5.
Zurück zum Zitat Joint Chiefs of Staff, Joint Operations (2012) Information Operations 3–13, U.S. Government Printing Office, Washington DC, II-9 Joint Chiefs of Staff, Joint Operations (2012) Information Operations 3–13, U.S. Government Printing Office, Washington DC, II-9
6.
Zurück zum Zitat Luttwak EN (2003) Strategy: the logic of war and peace. Belknap Press, Cambridge, MA, pp 39–40 Luttwak EN (2003) Strategy: the logic of war and peace. Belknap Press, Cambridge, MA, pp 39–40
7.
Zurück zum Zitat Aristotle (1993) Nicomachean ethics. In: Bennett WJ (ed) The book of virtues. Simon & Schuster, New York, p 102 Aristotle (1993) Nicomachean ethics. In: Bennett WJ (ed) The book of virtues. Simon & Schuster, New York, p 102
8.
Zurück zum Zitat Rosenzweig P (2013) Cyber warfare: how conflicts in cyberspace are challenging America and changing the world. Praeger, Santa Barbara Rosenzweig P (2013) Cyber warfare: how conflicts in cyberspace are challenging America and changing the world. Praeger, Santa Barbara
9.
Zurück zum Zitat Bousquet A (2009) The scientific way of warfare. Columbia University Press, New York Bousquet A (2009) The scientific way of warfare. Columbia University Press, New York
10.
Zurück zum Zitat Rattray GJ (2001) Strategic warfare in cyberspace. MIT Press, Amazon Rattray GJ (2001) Strategic warfare in cyberspace. MIT Press, Amazon
11.
Zurück zum Zitat Lonsdale DJ (2004) The nature of war in the information age. Frank Cass, London, p 154 Lonsdale DJ (2004) The nature of war in the information age. Frank Cass, London, p 154
12.
Zurück zum Zitat Kramer FD (2009) Cyberpower and national security: policy recommendations for a strategic framework. In: Kramer FD, Starr SH, Wentz LK (eds) Cyberpower and national security. Potomac Books, Washington, DC, p 14 Kramer FD (2009) Cyberpower and national security: policy recommendations for a strategic framework. In: Kramer FD, Starr SH, Wentz LK (eds) Cyberpower and national security. Potomac Books, Washington, DC, p 14
13.
Zurück zum Zitat Libicki MC (2012) Cyberspace is not a warfighting domain. I/S: A Journal of Law and Policy for the Information Society 8(2):330 Libicki MC (2012) Cyberspace is not a warfighting domain. I/S: A Journal of Law and Policy for the Information Society 8(2):330
14.
Zurück zum Zitat Hostage GM III, Broadwell LR Jr (2014) Resilient command and control: the need for distributed control. Joint Forces Quarterly 75:38–43 Hostage GM III, Broadwell LR Jr (2014) Resilient command and control: the need for distributed control. Joint Forces Quarterly 75:38–43
15.
Zurück zum Zitat Owens WA, Dam KW, Lin HS (eds) (2009) Technology, policy, law, and ethics regarding U.S. acquisition and use of cyberattack capabilities. National Academies Press, Washington, DC Owens WA, Dam KW, Lin HS (eds) (2009) Technology, policy, law, and ethics regarding U.S. acquisition and use of cyberattack capabilities. National Academies Press, Washington, DC
16.
Zurück zum Zitat Jeffrey Carr (2011) Inside cyber warfare: mapping the cyber underworld. O’Reilly Media, Beijing, Kindle location 3674 Jeffrey Carr (2011) Inside cyber warfare: mapping the cyber underworld. O’Reilly Media, Beijing, Kindle location 3674
17.
Zurück zum Zitat Libicki MC (2007) conquest in cyberspace: national security and information warfare. Cambridge University Press, CambridgeCrossRef Libicki MC (2007) conquest in cyberspace: national security and information warfare. Cambridge University Press, CambridgeCrossRef
18.
Zurück zum Zitat von Clausewitz C (1976) On war (ed and trans: Howard M, Paret P). Princeton University Press, Princeton, p 75 von Clausewitz C (1976) On war (ed and trans: Howard M, Paret P). Princeton University Press, Princeton, p 75
20.
Zurück zum Zitat Gray CS (1999) Modern strategy. Oxford University Press, Oxford Gray CS (1999) Modern strategy. Oxford University Press, Oxford
21.
Zurück zum Zitat O’Harrow R, Zero day. Diversion Books, New York, Kindle Location 345, part 2 O’Harrow R, Zero day. Diversion Books, New York, Kindle Location 345, part 2
22.
Zurück zum Zitat Rattray GJ (2009) An environmental approach to understanding cyberpower. In: Kramer FD, Starr SH, Wentz LK (eds) Cyberpower and national security. Potomac Books, Washington, DC Rattray GJ (2009) An environmental approach to understanding cyberpower. In: Kramer FD, Starr SH, Wentz LK (eds) Cyberpower and national security. Potomac Books, Washington, DC
Metadaten
Titel
Cyberspace Resiliency: Springing Back with the Bamboo
verfasst von
William Bryant
Copyright-Jahr
2015
DOI
https://doi.org/10.1007/978-3-319-23585-1_1

Premium Partner