Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Cyber Operations and Planning PDF

Download as pdf or txt
Download as pdf or txt
You are on page 1of 10

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/291970833

Cyber Operation Planning and Operational Design

Article · January 2016

CITATIONS READS

0 792

4 authors, including:

Hayrettin Çatalkaya Kerim Goztepe


Harp Akademileri Komutanligi Sakarya University
11 PUBLICATIONS   4 CITATIONS    51 PUBLICATIONS   267 CITATIONS   

SEE PROFILE SEE PROFILE

Some of the authors of this publication are also working on these related projects:

Information Security Risk Assessment Applying AHP in “R” Project View project

Applying Fuzzy Integral Approach for Ranking Criteria of Innovative Education View project

All content following this page was uploaded by Kerim Goztepe on 26 January 2016.

The user has requested enhancement of the downloaded file.


International Journal of Cyber-Security and Digital Forensics (IJCSDF) 5(1): 21-29
The Society of Digital Information and Wireless Communications, 2016 (ISSN: 2305-0012)

Cyber Operation Planning and Operational Design

Muhammer Karaman, Hayrettin Catalkaya, Ahmet Zeki Gerehan and Kerim Goztepe
Operations and Intelligence Turkish Army War College
War Colleges Command, 4. Levent/Istanbul, 34330, Turkey
mkaraman@harpak.edu.tr; hcatalkaya@harpak.edu.tr; azgerehan@harpak.edu.tr;
d065006003@sakarya.edu.tr

ABSTRACT 1 INTRODUCTION
Improving ICT infrastructure, dramatic increase in Throughout history, there has always been a
internet usage and increasing dependence on networks struggle of force among communities. Struggles,
have carried with cyber risks and threats. Complex, conflicts or fights have managed to reach up to
shape shifting and emerging risks and threats have modern times with different forms of tools, tactics
systematically paved the way for cyberspace to emerge and techniques [1]. Strategies are developed to
as a new domain after land, air, maritime and space. It
direct and command armies and also envision the
is obvious enough that cyber threats probably continue
to take part in global cyber theatre for years. However, enemy and its tactics. These strategies mainly vary
it is sometimes hard to pinpoint at first a specific axis depending on the commanders’ intents that form
of cyber threats; they are generally varied merely from the desired end state on the enemy. When we
a simple computer code to systematic cyber strikes like compare two outstanding military strategists, Sun
targeted cyber attacks, cyber terrorism and industrial Tzu and Clausewitz, and their work in order, “The
espionage activities. Due to the exponential use of Art of War” and “On War”, we can see some
cyberspace and the complex nature of cyber attacks, differences in them. For example, the concepts of
along with the multivariable cost they cause, it Sun Tzu generally imply that the force should be
becomes a requirement for operation planners to the last resort to apply. If the enemy is defeated
handle cyber operations and the problems in this without fighting that is better or to take a state
sphere in an operational design process. In this study,
untouched is recommended by him [2] On the
we tried to handle cyber operations in operational
design process in order to comprehend, visualize and other hand, Clausewitz emphasizes theoretically
enlighten complex cyber incidents holistically and the importance of "total war" or "absolute war".
present preventive and systematic approaches by As it is understood, he defines a war that is waged
proposing a cyber operational design model. By against the enemy with all resources and
presenting such model, we aim to help operation momentum until the enemy is wiped out [2]. In
planners understand the complexity of cyber today’s complex and multi-dimensional security
operations, show the advantage of using factor and environment, commanders need to analyze the
center of gravity analysis (COG) that is generally strategies and also take the new variables like
handled in military decision making process (MDMP) cyberspace, which is emerging as a new domain
and finally help the technical personnel to have an after air, land, maritime and space [3], into
understanding of operational planning. With the cyber
account. The operational environment, comprising
operational design presented as a sample in this study,
we plan to provide the commanders with a of friend, enemy and neutral systems, has been
comprehensive approach in cyber operations. experiencing a new factor, cyberspace, that
supports and interacts with operational variables
KEYWORDS like political, military, economic, social,
information, infrastructure etc [4] [5]. The
Cyberspace operations, operational design, cyber operational environment (OE) is not separate from
threats, cyber operational design, military decision information system infrastructure due to the large
making process (MDMP). amount of information running on networks [3].
Evolving technology and the increasing use of
social networks has necessitated the governments
21
International Journal of Cyber-Security and Digital Forensics (IJCSDF) 5(1): 21-29
The Society of Digital Information and Wireless Communications, 2016 (ISSN: 2305-0012)

and institutions to have at first the situational procedures, plans and doctrines to operate in this
awareness and then more than that. evolving and ambiguous area, cyberspace, where
Particularly, increasing use of information it is replete with criminal organizations and
communication technologies (ICT), smart devices individuals [3]. The targets of cyber attacks can
(phones and tablets) and over three billion people vary according to the causes and desired end states
having internet access have popularized the use of which the planners or perpetrators struggle to
blogs and social networks[6][7]. And along with attain. Qiao and Wang, The Two Chinese
these facts, cyberspace has become a suitable area Strategies, define the battlefield: “The battlefield
for criminals and terrorist organizations [8]. For is next to you and the enemy is on the network.
example, ISIS has been using the social media to Only there is no smell of gunpowder or the odor of
spread its ideology and message after it seized blood” [14].
Mosul, Iraq’s second-largest city, [9]. In In this study, we tried to adapt cyber
particular, ISIS was able to succeed in creating an operations to fit in an operational design and
atmosphere of fear in Iraq by releasing the named it cyber operational design in order to help
execution videos and photos on social networks cyber and operation planners to understand each
like Twitter and YouTube [10]. The power of other better and share this new OE in common.
social networks, during elections, street incidents Operational design is generally done before
in repressive regimes or during natural disasters, planning to visualize the enemy and operation
has proved its ability to change traditional one- environment and deal with the ill structured
way media, from news agency to people. With this problems in a more comprehensive way [15]. In
change in media, big news agencies also have section two we emphasized the need of cyber
taken advantages of user generated footage [11] operational design with mentioning about the well
As a consequence of those facts, some government known cyber attacks having strategic objectives.
actions are seen on interferences and restrictions In this section we also defined our study that it is
on access to information sources especially from not based on a real cyberspace operation. We
social networks that provide instant feeds. haven’t discussed about the legality of cyberspace
In this new operational environment where it operations in this section. In section 3, we
is easy to conceal itself for a long period of time, mentioned about operation planning, military
cyber wars have been waged similarly with decision making process (MDMP), operational art,
physical ones [12]. Being as real as physical ones, operational design and its elements. We also
cyber wars start in cyberspace and have effects prepared a sample cyber factor analysis that sheds
and influences in real life [13]. Increasing number light on cyber operational design explained in the
and diversities of cyber attacks require people, following section. In section 4, we defined the
institutions and countries to take strong measures relations between cyberspace operations and cyber
against them. These precautions range from operational design and the need of understanding
personal actions like being aware of cyber risks, of these two. In this section we prepared a
having situational awareness to strategic actions cognitive map of cyber operational design by the
like having a national cybersecurity document, help of factor analysis and cyber center of gravity.
forming a computer incident response team In conclusion, we have drawn attention to the need
(CIRT). More comprehensive approaches are also of cyber operational design and by this we have
put into action by founding governmental and shown the importance of bringing cyber specialists
military cyber organizations to protect the assets, and operation planners together for better planning
defense and cooperate. In these organizations, of military operations.
according to its level, vulnerability assessment,
cyber incident handling, configuration 2 METHODOLOGY
management and cyber training activities are
handled. As an institution, military organizations Understanding a complex operational environment
must ensure that its cyber assets are being such as cyber warfare requires a combination of
protected and must be prepared by adapting its art and science and ability to blend knowledge,
22
International Journal of Cyber-Security and Digital Forensics (IJCSDF) 5(1): 21-29
The Society of Digital Information and Wireless Communications, 2016 (ISSN: 2305-0012)

experience, intuition, and critical thinking that are of a higher command. In our study, we have
essential to operational design with analytical assumed that the complex security environment
methods and tools that support detailed planning. that we are currently living in, the interoperability,
[15]. In this study we assume that cyber operations joint operations and cutting-edge technology are
(defence, active defense or offense) have become going to play a significant role. What we have
an integral planning factor in operational and deducted from our assumption are to understand
strategic operations of countries or a operation planners and cyber professionals each
supplementary tool in reaching strategic other better in order to have a thorough, well
objectives. We reach this data from some cyber prepared cyber operation planning and to draw
and intelligence related incidents that quite many also a cyber situational awareness to both
professionals call them “cyber warfare” One of the technical and staff personnel.
leading cyber incidents is Stuxnet that intended to
disrupt a country’s nuclear facilities and it is 3 OPERATION PLANNING, MILITARY
widely believed that it is driven by a nation or DECISION-MAKING PROCESS (MDMP)
nations having a strategic objectives. Other cyber
warfare and intelligence activities can be Flame, 3.1 Operation Planning
Duqu, Red October, Regin and so on. Some of
these are believed to be initiated by intelligence Planning is an activity that helps bring the
organizations and some are also nation sponsored. commander’s visualization into practice and forms
Due to the complexity of cyberspace and lack of course of actions to reach a military target [16].
enough legal evidence on attribution to a specific Due to the ambiguous nature of military
source, they are not yet rightly ascribed to a source operations, many variables of the operational
or structure. environment and unforeseen events necessitate the
In our study, we will not discuss the legality of planning to be a continuous activity. According to
waging cyber warfare to an organization, country the Field Manual 5-0, The Operations Process,
or enemy and we will not probe the philosophy of planning is associated with art and firstly
just or unjust war. We are interested in the process comprehending then visualizing a fact and putting
of planning cyberspace operations (CO) alone or forward the ways to reach the target. [17].
as a part of another operation. We also emphasize Regardless of its level, planning is an
that a clear definition of jobs related to cyber indispensable part of an every organization. To
operations in military organizations should be manage the available time effectively and spare
prepared in detail and legal issues both in maximum time to subordinates [18], parallel
government and institutional level must entitle the planning is applied during a military decision
commanders and operation planners to act freely making process which is an analytical process or a
within the boundaries of a legal framework. checklist to carry out every element in sequence to
In this paper, we haven’t planned a real cyber reach a detailed document without escaping even a
operation and analyzed a previously planned cyber small point one’s notice.
operation either. We struggle to adapt cyber Operational design and operational planning
operations to take advantage of operational design, are two close, concurrent elements that can be
operational planning and military decision making prepared by a different or same team. It may not
process (MDMP) and used the elements of be easy to have two different (designers and
operational design to fit cyberspace operations planners) teams doing these two jobs. Besides,
(CO) like cyber line of operations (CLOO), cyber having two separate teams may result with lack of
center of gravity (CCOG), cyber decisive points coordination, synchronization and may harm the
(CDC) and cyber desired end state. While there nature of coupling of these two. Operation
are also some other elements of operational planning, is a set of procedures that are needed to
design, we haven’t analyzed all of them here. Our be started after getting a higher command’s order,
study can be better executed in operational and commander’s initial guidance or directly from the
strategic level unaided or in tactical level as a part situation. Operational planning can be classified in
23
International Journal of Cyber-Security and Digital Forensics (IJCSDF) 5(1): 21-29
The Society of Digital Information and Wireless Communications, 2016 (ISSN: 2305-0012)

two sections, conceptual and detailed planning Besides, it develop and compare courses of action
[19]. In this context; while the operational design and select appropriate decision.
forms the conceptual planning (with a cognitive
map) the military decision-making process forms 3.2.1 Factor Analysis
the detailed planning. [19]. And FM 5-0 also
describes that a powerful and useful planning is Factor analysis or the three-column format is sort
composed these two (conceptual and detailed) of a checklist for staff officers to take all factors
kinds of planning [20]. into account and deduct to do’s from it. It is a
frequently used methodology in MDMP and it can
3.2 Military Decision Making Process (MDMP) be used in all levels of operations. It functions as a
checklist for staff officers offering planners to
The military decision-making process (MDMP) is evaluate the operational environment, according to
a continuous and recurrent process helping their functionality areas and also put forward the
commander and staff to comprehend the situation, requirements to achieve the desired end state.
to analyze the mission, to get the commander’s It offers a way of ordering the commander’s and
initial guidance, to develop course of actions [22] staffs’ thought processes, and generates discipline
[23]. With the inputs of each staff officers relating in identifying the outputs of factor analysis. It is
with their professions, functional areas (Command generally prepared in three column format
and control, engineering, air defense etc.), started (Critical Vulnerability, Deduction and Output) and
mission and other iterative planning methodology named also the same. Factor analysis in table 1 is
that integrates the activities of the commander, prepared in cyber means helping the CO planners
subordinate headquarters, staff and other partners to help put forward mission, critical activities
to understand the situation. about its functional area and critical
vulnerabilities. The clear definition of these will
Table 1: A Sample of Cyber Factor Analysis (Three Column also help CO and operation planners to analyze the
Format) center of gravity both of enemy and friend.
Mission / Critical
Activity / Functional
Deduction Output
Area/
Critical Vulnerability
To plan professional cyber security trainings
Being unable to envision the cyber risks.
on theory and hands on.
To plan cybersecurity lessons in military high schools
Lack of Talented Cyber Being exposed to cyber incidents and and academies.
Specialists in Military unaware of them for a long time. Station some personnel on job training to scientific
Organizations. organizations and institutes dealing with cybersecurity.
To plan cyber threat situational awareness training for
Being unable to sustain situational
commanders and staff to remind that cybersecurity is
awareness among commanders and staff.
the commander responsibility.
Enough workforce assignment of cyber To defend information systems 24/7.
professional and a clear definition of
To Defend Army Critical To hire part time or full time civilian contractors,
“defense, active defense and offense” in
Information Systems engineers, hackers and malware analysts.
procedures.
Against cyber Attacks.
Building strong coordination with To assign liaison personnel mutually between cyber
intelligence organizations. command and intelligence units.
To plan cyber exercises to draw attention of leading
Being an easy target to fishing attacks.
cyber attacks (fishing, waterhole attacks, etc.)
The Risks of Open Source
Gathering OSINT via social networks with To limit the use of social networks in military
Intelligence (OSINT) and
masked and fake social network accounts. organizations.
Social Networks.
Using metadata of uploaded contents and To assign a content operator to control, erase and
EXIF information of uploaded photos [21] change the metadata and other information of contents.

24
International Journal of Cyber-Security and Digital Forensics (IJCSDF) 5(1): 21-29
The Society of Digital Information and Wireless Communications, 2016 (ISSN: 2305-0012)

3.2 Operational Art and Operational Design


3.2.2 Center of Gravity (COG) Analysis
3.2.1 Operational Art
Among the elements of cyber operational design, According to Joint Pub 1-02, operational art is
CCOG is the key one to reach the desired end defined as the use of military forces to reach
state. In center of gravity analysis, there are military objectives (strategic and operational) with
several questions to be answered: What’s the end design, organization, integration, and use of
state that the enemy wants? What kind of activities strategies. [24] Operational art plays a key role in
can the enemy perform to reach the end state? conveying the commander’s intuition and strategy
Which requirements support enemy’s such into operational design by accounting all related
activity? And which activities prevent the friend to factors of war.
achieve its end state? In CCOG analysis we can
get the advantage of cyber factor analysis that
consists of critical friend and enemy capabilities,
missions and vulnerabilities.

Table 2: A Sample of Cyber Center of Gravity (CCOG) Analysis.

Cyber Center of Gravity (CCOG) Critical Capabilities (CC)


To implement cyber attacks against SCADA Systems by manual means
(Hiring a person/supporter to use a malware/worm infected hard drive on
these systems).
To infect enemy’s military information systems with a computer virus,
worm or malware to steal or gather information (Screen shots, key strokes
and files) by infiltrating into the systems or spear fishing by using social
SCADA Systems and Military Information
networks, open source intelligence (OSINT) and social engineering.
Systems Infrastructure.
To implement a zero day exploit to database, email, file servers that are
connected on internet.
To implement DDOS attacks.
To implement cyber-electronic warfare activities in order to get electronic
intelligence from frequency logs of command and control systems by
using airborne warning/intelligence systems or drones.
Critical Vulnerabilities (CV) Critical Requirements (CR)
To gather OSINT about SCADA/Cyber Physical Systems and their
Limited use of cyber intelligence activities.
system requirements by using TOR networks or spoofed IP addresses.
National and international legal challenges and
NATO perspective on cyber issues (Accepting it as Preparing a legal frame document that clearly defines the activities, tasks
an act of war or not, ambiguity of cyber rules of and duties about cyber.
engagements etc.)
Lack of talented cyber specialists and cyber Reverse engineering and multi criteria analysis of some well known
manpower planning in military organizations. malwares directed to gather information from the systems they infected.
Lack of a roadmap and strategy designed to reach
To initiate a collaboration and among technical universities, civil
the national cyber security policy, lack of
institutions and defense firms about research and development (R&D) in
information sharing with institutions, universities
cyber
and defense firms.
Lack of a clear task definition of cyber activities Forming a social network team, working 24/7 and solely focusing on
among institutions. Facebook, Twitter, LinkedIn, Vine, Instagram and the others also.
The lack of integration of cyber and intelligence
To have a national vulnerability database and enough cyber experts and
units and the dilemma of whose job that is, limited
contractors.
cooperation between these two functional areas.

The legal challenges. A great number of zombie computers, botnes.

The difficulty in integrating and implementing cyber


and electromagnetic activities in tactical level under Strong cooperation between intelligence cyber units.
a command. 25
International Journal of Cyber-Security and Digital Forensics (IJCSDF) 5(1): 21-29
The Society of Digital Information and Wireless Communications, 2016 (ISSN: 2305-0012)

Figure 1: A sample cognitive map of an operational design [28]

3.2.2 Operational Design

Operational design is a methodology having the


structure of concepts, a visual and comprehensive
map of a campaign or operation in order to attain
the desired end state. [25]. The main elements of
operational design showed in figure 1are; line of
operations (LOO), decisive points (DC), center of
gravity (COG), end state are shown in a sample
cognitive map of an operational design. Figure 2: A taxonomy of learning [15].

3.2.3 Critical and Creative Thinking 4 CYBERSPACE OPERATIONS AND


To deal with complex and multidimensional CYBER OPERATIONAL DESIGN
problems and develop solutions, operational
designers should apply critical and creative 4.1 Cyberspace Operations (CO)
thinking [15]. Critical thinking is a process
comprising of conceptualizing, applying, Cyberspace operations (CO) are the use of
analyzing, synthesizing, and/or evaluating cyberspace capabilities where the main purpose is
information regardless of how it is gathered, to attain the objectives in or through cyberspace
produced, experienced or observed. [26]. While [29]. With the advent of cyber in the globe theatre,
emphasizing on critical and creative thinking in it has become a must for commanders and
operational design Bloom’s Taxonomy of operation planners to take necessary measures to
Learning can shed a light on this issue. As shown protect their ICT and critical assets. In military
in figure 2, 1956 old model, developed for operations, similar to electronic warfare planning
educational purposes, is a model that can help us and support of operations, CO should also be
relate critical thinking and creative thinking by integrated into these operations according to its
associating them with the model’s components level. CO integration into military operations
[27] [15]. It is supposed that the commanders should be planned in detail by following the
should be in a better level of their subordinates in MDMP. The considerations of CO planners in
creative thinking due to their experience, training MDMP are similar to other functional area
and knowledge and judgement. considerations. With the start of MDMP, CO
planners are going to need intelligence
requirements about the enemy and environment.

26
International Journal of Cyber-Security and Digital Forensics (IJCSDF) 5(1): 21-29
The Society of Digital Information and Wireless Communications, 2016 (ISSN: 2305-0012)

Depending on the commander’s intent or CO In a cyber cognitive map, cyber operational


planners, cyber operational design should be design, the same elements of operational design
prepared by CO planners before or with the first are applied. Cyber operational design (COD)
step of MDMP, receipt of mission. Having a cyber consists of cyber line of operations (Government,
operational design will help CO planners to better people and military), Decisive Points (DC), center
integrate their objectives with major military of gravity (COG) and the end state (Desired End
operations. State). All elements of cyber operational design in
figure 3 should serve to reach the end state in four
4.2 Cyber Operational Design (COD) phases of which starts with “Confusion Initiation”
The designing of cyber operations regardless of and ends with “Dominate” phase. The cyber
the common operation picture (COP) or not within operational design in figure 4 can also be adjusted
an MDMP, may cause the expected impact to all levels of military or governmental
become weak and ineffective. Eliciting the art of organizations by elaborating more than one COG
war and stimulating the critical and creative (Operational and Strategic COG) or End State
thinking, operational design put forward the (Military and Governmental End State).
general picture of operation, which is called the
cognitive map.

Figure 3: A Sample Cognitive Map of Cyber Operational Design.

27
International Journal of Cyber-Security and Digital Forensics (IJCSDF) 5(1): 21-29
The Society of Digital Information and Wireless Communications, 2016 (ISSN: 2305-0012)

understand and contribute each other well and this


cooperation will then provide a stronger,
5 CONCLUSION foreseeable institutional and national
cybersecurity.
In complex, multidimensional and
multivariable security environment, it has become 6 REFERENCES
a must to get prepared all kinds of threats. What is
becoming obvious that, with the evolving and [1]. Handel, M. I. (2005). Masters of war: classical
cutting edge technology most of the threats are strategic thought. Routledge.
somehow emerging or being transferred with [2]. Handel, M. I., (1991) Sun Tzu and Clausewitz: The Art
information systems. National Critical of War and On War Compared, Strategic Studies
Institute U.S. Army War College Carlisle Barracks,
Infrastructures of countries are operating in
Pennsylvania.
networks, government and military organizations’
data centers are working with software and [3]. Pamphlet, T. R. A. D. O. C. (2010). TRADOC
Pamphlet Cyberspace Operations Concept Capability
hardware that even the system administrators can’t Plan2016-2028. Washington, DC: DoD.
control over them thoroughly. With the increasing
use of smart devices, phones, appliances and even [4]. Goztepe, K., Kilic, R., & Kayaalp, A. (2014). Cyber
Defense In Depth: Designing Cyber Security Agency
cars people become more and more interconnected Organization For Turkey. Journal of Naval Science and
with technology every day. Increasing use of Engineering, 10(1), 1-24.
social networks and all other improvements as a
[5]. Goztepe, K. (2012). Designing Fuzzy Rule Based
natural consequence of technological evolutions Expert System for Cyber Security. International
have facilitated the work of intelligence agents Journal of Information Security Science, 1(1), 13-19.
and cyber criminals. To gather information via [6]. Singh, A. K., & Sahu, R. (2008). Integrating Internet,
open source and social networks like Facebook, telephones, and call centers for delivering better quality
twitter, LinkedIn, Instagram and the others have e-governance to all citizens. Government Information
become an easy job even for a standard internet Quarterly, 25(3), 477-490.
user. What the government and military [7]. Güngör, V. C., Sahin, D., Kocak, T., Ergüt, S.,
organizations should do in this changing security Buccella, C., Cecati, C., & Hancke, G. P. (2011). Smart
environment is to scrutinize the current plans and grid technologies: communication technologies and
procedures to support the flexibility of operations standards. Industrial informatics, IEEE transactions on,
7(4), 529-539.
to adapt to new, unforeseen threats and risks that
we sooner or later may be exposed to. [8]. Choo, K. K. R. (2008). Organised crime groups in
cyberspace: a typology. Trends in organized crime,
We assume that cyber incidents will continue 11(3), 270-295
to play a significant role in global theatre and
institutions should be well prepared to withstand [9]. Kay M., J. (2014) “ISIS Tactics Illustrate Social
Media’s New Place In Modern War”, [online],
and defend their critical assets which are mostly http://techcrunch.com/2014/10/15/isis-tactics-illustrate-
on our networks, databases and command control social-medias-new-place-in-modern-war/
systems. In this context, we make an analogy of
[10]. Boz, G. (2014) “ISIS and Social Media”, [online],
ill-structured problems with cyber threats/attacks Ankara Strategy Institute,
that are complicated, hard to detect and targeted. http://www.ankarastrateji.org/haber/isis-and-social-
Therefore by emphasizing the importance of media-1399/
design and its elements, we propose a cyber [11]. Newman, N., Dutton, W. H., & Blank, G. (2012).
operational design to be used in cyberspace Social media in the changing ecology of news: The
operations to envision the cyber threats, cyber fourth and fifth estates in Britain. International Journal
attacks, cyber intelligence and espionage activities of Internet Science, 7(1), 6-22.
both conceptually and comprehensively. We [12]. Hejase, A. J., Hejase, H. J., & Hejase, J. A. (2015)
believe that by having a cyber operational design, Cyber Warfare Awareness in Lebanon: Exploratory
the operation planners and cyber professionals will Research. International Journal of Cyber-Security and
Digital Forensics (IJCSDF) 4(4): 482-497
come to a common point where they can
28
International Journal of Cyber-Security and Digital Forensics (IJCSDF) 5(1): 21-29
The Society of Digital Information and Wireless Communications, 2016 (ISSN: 2305-0012)

[13]. Al-Ahmad, W. (2013). A Detailed Strategy for [27]. Bloom, B., & Englehart, M. F. E., Hill, W., &
Managing Corporation Cyber War Security. Krathwohl, D.(1956). Taxonomy of educational
International Journal of Cyber-Security and Digital objectives: The classification of educational goals.
Forensics (IJCSDF), 2(4), 1-9. Handbook I: Cognitive domain.
[14]. Liang, Q., & Xiangsui, W. (1999). Unrestricted warfare [28]. Joint Publication 5-0 (2011) Joint Operation Planning,
(pp. 551-563). Beijing: PLA Literature and Arts Headquarters Department of Defense.
Publishing House.
[15]. Joint Staff, J-7 (2011) Planner’s Handbook for
Operational Design, Joint and Coalition Warfighting
Suffolk, Virginia.
[16]. Lussier, J. W., Shadrick, S. B., & Prevou, M. I. (2003).
Think Like a Commander prototype: Instructor's guide
to adaptive thinking (No. ARI-RP-2003-02). Army
Research Inst. for the Behavioral and Social Sciences
Alexandria VA.
[17]. FM 5-0. (2010) The Operations Process, Headquarters
Department of The Army.
[18]. FM 101-5. (1997) Staff Organization and Operations,
Headquarters Department of the Army Washington,
DC.
[19]. Kober, A.E. (2010) Bridging the Planning Gap:
Linking Conceptual Army Design to Military Decision-
Making, School of Advanced Military Studies United
States Army Command and General Staff College Fort
Leavenworth, Kansas.
[20]. Grigsby Jr, W. W., Gorman, S., Marr, J., McLamb, J.,
Stewart, M., & Schifferle, P. (2012). Integrated
Planning the Operations Process, Design, and the
Military Decision Making Process. Military Review,
92(4), 15.
[21]. Catalkaya H., Karaman M. (2015). Institutional
Cybersecurity: The Risk of Open Source Intelligence
(OSINT) and Social Networks, International
Conference on Military Security Studies (ICMSS-
2015), Istanbul.
[22]. Kem J.D. (2012) Planning for Action: Campaign
Concepts and Tools, U.S. Army Command and General
Staff College U.S. Army Combined Arms Center Fort
Leavenworth, Kansas.
[23]. Goztepe, K., Kahraman, C. (2015) A New Approach to
Military Decision Making Process: Suggestions from
MCDM Point of View, International Conference on
Military and Security Studies-2015, Istanbul, 118-122.
[24]. Joint Publication 1-02 (1994) Department of Defense
Dictionary of Military and Associated Terms,
Headquarters Department of Defense.
[25]. McCauley, D. (2011). Design and Joint Operation
Planning. Canadian Military Journal, 12(1), 30-40.
[26]. Scriven M., Paul R. (1987) “National Council for
Excellence in Critical Thinking”, 8th Annual
International Conference on Critical Thinking and
Education Reform, Summer 1987.

29

View publication stats

You might also like