Skip to main content

The Modern Strategies in the Cyber Warfare

  • Chapter
  • First Online:
Cyber Security: Power and Technology

Part of the book series: Intelligent Systems, Control and Automation: Science and Engineering ((ISCA,volume 93))

Abstract

As there is no generally accepted definition for cyber warfare, it is a term that is quite liberally used in describing events and actions in the digital cyber world. The concept of cyber warfare became extremely popular from 2008 to 2010, partly superseding the previously used concept of information warfare which was launched in the 1990s. For some, cyber warfare is war that is conducted in the virtual domain. For others, it is a counterpart to conventional “kinetic” warfare. According to the OECD’s 2001 report, cyberwar military doctrines resemble those of so-called conventional war: retaliation and deterrence. Researchers agree with the notion that the definition of cyberwar should address the aims and motives of war, rather than the forms of cyber operations. They believe that war is always widespread and encompasses all forms of warfare. Hence, cyber warfare is but one form of waging war, used alongside kinetic attacks. The new capacities of armed forces create new possibilities, for both the kinetic and non-kinetic use of force in cyberspace. Cyber era capabilities make possible operations in the new nonlinear and indefinite hybrid cyber battlespace. It must be possible to seamlessly integrate the decision-makers, actors and all types of manned and unmanned platforms in the air, on the surface, under the surface, in space, and in cyberspace. The main trends that are changing the cyber battlespace are networking, time shortening, the increase in the amount of data, and proliferation of autonomous and robotic systems, as well as artificial intelligence and cognitive computing.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Alford LD (2009) Cyber warfare: the threat to weapon systems. WSTIAC Q 9(4)

    Google Scholar 

  • Arar S (2017) IBM Watson joins the war on cybercrime. All About Circuits, 13 Jan 2017

    Google Scholar 

  • Arwood S, Mills R, Raines R (2010) Operational art and strategy in cyberspace. In: International conference on information warfare and security, 16-XII. Academic Conferences International Limited, Apr 2010

    Google Scholar 

  • ASCAC (2013) Synergistic challenges in data-intensive science and exascale computing, DOE ASCAC data subcommittee report, March

    Google Scholar 

  • Bazin AA (2005) Boyd’s O-O-D-A loop and the infantry company commander. Infantry January Febr 94(1)

    Google Scholar 

  • Bonner EL (2012) Cyberpower learning from the rich historical experience of war. In: International conference on information warfare and security, pp 351–IX

    Google Scholar 

  • Bonner EL (2014) Cyber power in 21st-century joint warfare. JFQ 74(3):102–109

    Google Scholar 

  • Boyd JR (1986) Patterns of conflict

    Google Scholar 

  • Boyd JR (1987a) The strategic game of? And?

    Google Scholar 

  • Boyd JR (1987b) A discourse on winning and losing

    Google Scholar 

  • Boyd JR (1995) The essence of winning and losing

    Google Scholar 

  • Cahanin SE (2012) Principles of war for cyberspace. Air War College Maxwell Paper No. 61 Maxwell Air Force Base

    Google Scholar 

  • Edwards P (1996) The closed world, computers and politics of discourse in cold war America. MIT Press, Cambridge

    Google Scholar 

  • Freedberg SJ (2016a) Robots, techies, and troops: carter and roper on 3rd offset. In: Breaking defence, 13 June 2016

    Google Scholar 

  • Freedberg SJ (2016b) Artificial intelligence for air force: cyber and electronic warfare. In: Breaking defence, 20 Sep 2016

    Google Scholar 

  • Hurley MM (2012) For and from cyberspace: conceptualizing cyber intelligence, surveillance, and reconnaissance. USAF Air Space Power J 26.6 (Nov/Dec 2012):12–33

    Google Scholar 

  • IDC (2014) The digital universe of opportunities: rich data and the increasing value of the internet of things. White paper April 2014

    Google Scholar 

  • Kagan FW (2006) Finding the target, the transformation of American military policy. Encounter Books, New York

    Google Scholar 

  • Kelly JE (2015) Computing, cognition and the future of knowing. IBM Corporation

    Google Scholar 

  • Kenny R (2015) Four ways artificial intelligence will change our lives. Signal September

    Google Scholar 

  • Kuehl D (2009) From cyberspace to cyberpower: defining the problem. In: Kramer F, Starr S, Wentz L (eds) Cyberpower and national security. National Defense University Press and Potomac Books, Washington, DC, pp 24–42

    Google Scholar 

  • Lee RM (2013) The interim years of cyberspace. Air Space Power J 27.1 Jan/Feb 2013:58–79

    Google Scholar 

  • Libicki MC (2007) Conquest in cyberspace—national security and information warfare. Cambridge University Press, New York

    Google Scholar 

  • Mason S (2003) John Boyd and strategic Naval air power. In: United States naval institute proceedings, vol 129, no 7, Annapolis

    Google Scholar 

  • Miller CB (1997) USAF TACS battle management: preparing for high tempo future operations, USAF

    Google Scholar 

  • Nye JS (2011) Nuclear lessons for cyber security? Strat Stud Q Winter:18–39

    Google Scholar 

  • Osinga FPB (2007) Science, strategy and war, the strategic theory of John Boyd, Routledge

    Google Scholar 

  • Shanahan JNT (2001) Shock-based operations, New wine in an old jar. Air Space Power J

    Google Scholar 

  • Scherrer JH, Grund WC (2009) A cyberspace command and control model. Air War College, Maxwell Paper No. 47, Air University Press, Maxwell Air Force Base, Alabama

    Google Scholar 

  • Sorensen CL (2010) Cyber OODA: towards a conceptual cyberspace framework. Doctoral Thesis, School of Advanced Air and Space Studies, Air University, Maxwell Air Force Base, Alabama

    Google Scholar 

  • Warden JA (1995) The Enemy as a system. Airpower J

    Google Scholar 

  • Warden JA (1998) The air campaign: planning for combat, to excel reprint

    Google Scholar 

  • Warden JA (2000) Strategic thinking and planning. Venturist Publishing, Montgomery, Alabama

    Google Scholar 

  • Warden JA (2011) Interview by Martti Lehto, Montgomery, Alabama, 23 Feb 2011

    Google Scholar 

  • Weisbrook RE (2007) Captain, USN, adapt or die, the US military’s responsibility to protect America by leading the transformations in science and technology. Strat Stud Q I(2)

    Google Scholar 

  • West SD (1999) Warden and the air corps tactical School-Déjà Vu? Thesis presented to the Faculty of The School of Advanced Air and Space Studies. Air University Press, Maxwell AFB, Alabama

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Martti Lehto .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG, part of Springer Nature

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Lehto, M. (2018). The Modern Strategies in the Cyber Warfare. In: Lehto, M., Neittaanmäki, P. (eds) Cyber Security: Power and Technology. Intelligent Systems, Control and Automation: Science and Engineering, vol 93. Springer, Cham. https://doi.org/10.1007/978-3-319-75307-2_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-75307-2_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-75306-5

  • Online ISBN: 978-3-319-75307-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics