Abstract
Improving infrastructure, information and communication technologies to significantly increase the use of the Internet is still in use in cyber risks and network threats. Complex movements and new risks and threats systematically paved the way for the language has become a new field of land, air, sea, and space. It is quite clear that the cyber threat is likely to continue to intervene in theaters in the world of cyber year. But sometimes it is difficult to determine, first, column’s Cyber-specific threats—remotely simple computer code into cash Cyber sure that the cyber attacks, cyber terrorism, and industrial espionage. Because, combined with the price of “exponential language and complex cyber attacks, multivariate caused, it becomes a requirement for designers, how to deal with cyber activities and problems in this area in the operational planning process. In this article, we tried to achieve a continuous production flow Cyber in order to understand and visualize complex question of the complexity of cyber crime, and the scope and systematic prevention provide a standard Internet operating model. Disguised as standard, we aim to help designers understand the complex task Cyber demonstrates, the advantage of using the force of gravity analysis of the factors (COG), which is usually dealt with military decision-making (MDMP) at the end of using technicians have an understanding of business planning. Operational cyber proposal will be presented as an example in this study; there are plans to provide a comprehensive Internet-based leader.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Trade, M.I.: Master of war: classic strategic thinking. Routledge (2005)
Trade, M.I., Clausewitz, S.T.: The Art of War and the War College, the US Army Institute for Strategic Studies in Carlisle Barracks, Pennsylvania War (1991)
The brochure, A. T. R. C. (2010). TRADOC Cyberspace Operations Concept Plan 2016–2028 capabilities brochure. Washington, DC: DOD
Göztepe, K., Kilic, R., Food, A.: Depth cyber defense: design cyber security agency in Turkey. Mar. Sci. Technol. J. 10(1), 1–24 (2014)
Göztepe, K.: Based on fuzzy rules based system design expert in computer security. Int. J. Inf. Secur. Sci. 1(1), 13–19 (2012)
Singh, A.K., Sahu, R.: A better quality of internet, telephone and call center integration of e-government for all citizens. Gov. Inf. Q. 25(3), 477–490 (2008)
Gungor, V.C., Falcon, D., Kocak, T., Ergūte, S., Buccella, C., Cecati, C., Hancke, G.P.: Smart Grid and communications technologies and standards. IEEE Trans. Comput. Ind. 7(4), 529–539 (2011)
Choo, K.K.R.: Organized criminal groups in cyberspace: the typology. Organized Crime Trends 11(3), 270–295 (2008)
Kay M.J.: The ISIS tactic Social Media a new place in modern warfare [online]. http://techcrunch.com/2014/10/15/isis-tactics-illustrate-socialmediatonewlocation,modernwar(2014)
Gray, G.: (2014) Isis and social media [online], Ankara Strategy Institute. http://www.ankarastrateji.org/haber/isis-and-social-media1399/
Newman, N., Dutton, W.H., Blank, G.: Social media is changing the ecology of Britain in the fourth and fifth block. Internet Sci. Int. J. 7(1), 6–22 (2012)
Héjas, A.J., Héjas, H., Héjas, J., JA (2015) Cyber war in Lebanon awareness: intelligence research. Int. J. Cyber Secur. Justice Digit. (IJCSDF) 4(4):482–497
Al-Ahmad, W.: Cyber security corporation has developed a strategy for the management of the war. Int. J. Cyber Secur. Justice Digit. (IJCSDF) 2(4), 1–9 (2013)
Liang, G., Xiangsui, W.: Free-of-war, pp. 551–563. PLA Literature and Art Publishing House, Beijing (1999)
Joint Staff, the operational model of the J-7. Planner Manual, joint and coalition warfare in Suffolk, Virginia (2011)
Lussier, J.W., Shadrick, S.B., Prevost, M.I.: Think of it as the commander of a prototype: an adaptive approach (no ARI-RP-2003–02), instruction manual. Army Research Inst. Behavioural and Social Sciences, Alexandria, VA (2003)
FM 5–0. (2010) Process Operations Defence Staff of the Army
FM 101-5. (1997) the organization and operation of the Army, Washington, DC, Headquarters Division staff
Kober, (2010), the AA Design I remove: Army military planning decision-making, coordination, the Advanced Military Studies, United States Army Command and General Staff College at Fort Leavenworth School
Grigsby Jr., W.W., Gorman, S., Marr, J., McLamb, J., Stewart, M., Schiffer, P.: Integrated planning, design, military operations in decision making. Mil. Rev. 92(4), 15 (2012)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Abdul, A., Cherukuvada, S., Soujanya, A., Sridevi, G., Umar, S. (2018). Cognitive Networked Redemption Operational Conception and Devising (CNROCD). In: Pant, M., Ray, K., Sharma, T., Rawat, S., Bandyopadhyay, A. (eds) Soft Computing: Theories and Applications. Advances in Intelligent Systems and Computing, vol 584. Springer, Singapore. https://doi.org/10.1007/978-981-10-5699-4_16
Download citation
DOI: https://doi.org/10.1007/978-981-10-5699-4_16
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-5698-7
Online ISBN: 978-981-10-5699-4
eBook Packages: EngineeringEngineering (R0)