ترجمه مقاله نقش ضروری ارتباطات 6G با چشم انداز صنعت 4.0
- مبلغ: ۸۶,۰۰۰ تومان
ترجمه مقاله پایداری توسعه شهری، تعدیل ساختار صنعتی و کارایی کاربری زمین
- مبلغ: ۹۱,۰۰۰ تومان
Abstract:
Recently, there have been calls for the United States to unleash the offensive power of cyberspace. Advocates contend that offense has the advantage in cyberspace. This article argues that cyberspace does not favor the offensive at either the tactical or the strategic level. In fact, a defensive doctrine has clear advantages over an offensive one. Support for this argument can be found in two unexpected sources: official statements of U.S. Army doctrine and Carl von Clausewitz’s On War. This is surprising, given that scholars consider both the U.S. Army and Clausewitz diehard apostles of the cult of the offensive. This essay seeks to import their insights about the advantages of the defense into the virtual realm. When read carefully, U.S. Army doctrine and Clausewitz’s classic text support the claim that defense is the stronger approach in the cyber realm.
Cyber Defense Going Forward
Military doctrine and thinking can be an important source of insight into the advantages of defensive operations in cyberspace. Calls for the United States to develop the offensive side of its cyber strategy have their merits. Moreover, leaders will be attracted to cyber-attacks as a low-cost covert action. However, the cyber offense risks conflict escalation and could undermine the image of the United States as the defender of the internet status quo. The promotion of offensive cyber operations overlooks the real and potential advantages of the cyber defense. A number of these advantages, like defense in depth and surprise, can be adapted to the cyber realm. In addition, awareness of the virtues of cyber defense, some of which cyber defenders already use, can help guide the development of new cyber capabilities. These defensive insights can help to shape concepts of operations, which often drive technological innovation, rather than vice versa. For instance, this analysis shows the importance of developing better capabilities for observing hackers after they infiltrate a network and in developing better “honeypots” and false networks to buy more time to identify the attacker and its intentions. In addition, for those who insist on a cyber offense, a robust cyber defense is actually the most effective prelude to an offensive cyber counterattack