Title: Cyber Operation Planning and Operational Design

Issue Number: Vol. 5, No. 1
Year of Publication: Jan - 2016
Page Numbers: 21-29
Authors: Kerim Goztepe, Muhammer Karaman, Hayrettin Catalkaya, Ahmet Zeki Gerehan
Journal Name: International Journal of Cyber-Security and Digital Forensics (IJCSDF)
- Hong Kong
DOI:  http://dx.doi.org/10.17781/P001982

Abstract:


Improving ICT infrastructure, dramatic increase in internet usage and increasing dependence on networks have carried with cyber risks and threats. Complex, shape shifting and emerging risks and threats have systematically paved the way for cyberspace to emerge as a new domain after land, air, maritime and space. It is obvious enough that cyber threats probably continue to take part in global cyber theatre for years. However, it is sometimes hard to pinpoint at first a specific axis of cyber threats; they are generally varied merely from a simple computer code to systematic cyber strikes like targeted cyber attacks, cyber terrorism and industrial espionage activities. Due to the exponential use of cyberspace and the complex nature of cyber attacks, along with the multivariable cost they cause, it becomes a requirement for operation planners to handle cyber operations and the problems in this sphere in an operational design process. In this study, we tried to handle cyber operations in operational design process in order to comprehend, visualize and enlighten complex cyber incidents holistically and present preventive and systematic approaches by proposing a cyber operational design model. By presenting such model, we aim to help operation planners understand the complexity of cyber operations, show the advantage of using factor and center of gravity analysis (COG) that is generally handled in military decision making process (MDMP) and finally help the technical personnel to have an understanding of operational planning. With the cyber operational design presented as a sample in this study, we plan to provide the commanders with a comprehensive approach in cyber operations.