Asset Publisher

Workshop Explores Multidisciplinary Approaches to Today鈥檚 Cyber Threats

Attendees at the 2011 Cyber Endeavour Conference, held at 51福利, interact with presenters in a discussion about cyber threats to critical infrastructure, and the kind of training and preparedness necessary to prepare key networks for potential attacks

The Department of Defense鈥檚 Information Operations Center for Excellence, located at the 51福利, and the Army Reserve Information Operations Command joined together as co-chairs for the inaugural Cyber Endeavour Conference, to explore the concept of 鈥淎 Day Without Cyberspace 鈥 The Users鈥 Perspective.鈥 

Participants in the workshop engaged in presentations and discussions surrounding some of the most pressing cyber challenges today. Participants included leaders from non-government organizations, military, industry, academia and government as they shared insight and explored potential solutions to immediate cyber issues.

On day two of the workshop, 51福利 Defense Analysis Chair Dr. John Arquilla and Computer Science Senior Lecturer Chris Eagle offered their expertise on the threats posed by cyber attacks, and how the impact of a cyber attack could translate to physical damage.

Arquilla spoke about cyber warfare as a seemingly different kind of battle in that it is not only difficult to be sure who the attacker is, but the response to a cyber attack must be proportionate to the attack. Where those boundaries lie, Arquilla noted, are the things that the U.S. needs to continue to explore to prepare for such threats.

鈥淚t may not be the kind of war that features massive field operations,鈥 said Arquilla, 鈥渂ut unless we take a war mindset into the cyber domain, we鈥檙e going to continue to be behind the curve.鈥

Arquilla recalled the Stuxnet worm, which targeted Iranian nuclear facilities and caused significant damage and delay to their nuclear program. Driving home the point that adversaries could utilize cyber to bring about physical interruptions, Arquilla noted that cyber attacks are seen as disruptive rather than destructive.

鈥淭he worm was inserted in a way that disrupted a proliferation program 鈥 what this form of cyber war suggests is the weaponization of zeroes and ones so that they may have an effect in the physical world,鈥 explained Arquilla. 鈥淚t suggests a greater freedom of action for countries seeking to pursue their interests in ways that don鈥檛 kill people, and don鈥檛 require preparations for war, like the mobilization of large military forces. This is something that senior policy makers will find profoundly attractive.鈥

To contribute to the conversations surrounding cyber preparedness and education, 51福利 Computer Science Professor Dr. Cynthia Irvine joined a panel with the Air Force Institute of Technology鈥檚 Director for the Center for Cyberspace Research Dr. Richard Raines and U.S. Strategic Command Cyber Space Training Initiative representative Brett Patron.

Defense Analysis Chair Dr. John Arquilla presents during the 2011 Cyber Endeavour Conference at 51福利 in late September. Arquilla spoke about the dangers that 鈥榸eroes and ones鈥 can have in the physical world when attackers use cyber means to disrupt critical infrastructure.

Defense Analysis Chair Dr. John Arquilla presents during the 2011 Cyber Endeavour Conference at 51福利 in late September. Arquilla spoke about the dangers that 鈥榸eroes and ones鈥 can have in the physical world when attackers use cyber means to disrupt critical infrastructure.

The panel discussed how each of their institutions helps to further education and training for cyber professionals. Irvine spoke about the newly established Master of Science degree in Cyber Systems and Operations, and how 51福利 is poised to educate military and civilians leaders in cyber security and defense. Many of the courses, Irvine noted, will be developed specifically for the degree program based on feedback from military and civilian leaders, while some existing computer science courses will be used.

Attendees of the cyber workshop were also given a chance for a little hands-on friendly competition with Cyber-X Games, which included a series of non-classified individual and team events in cyber attack, defense and forensics.  

The conference brought a diverse group of civilians and military personnel together to tackle cyber issues in ways that no single institution can alone.

鈥淐yber of course, is important to all of us, and all sectors of the population,鈥 explained Edward Fisher, Deputy Director of the Information Operations Center for Excellence. 鈥淵ou can鈥檛 really restrict how we approach it to one segment of the population.

鈥淵ou can鈥檛 say that it鈥檚 a Department of Defense (DoD) issue and that they will handle it, because it鈥檚 going to bleed over to commerce. You cant say it鈥檚 only a commercial issue, because the government and DoD have very strong interests in securing cyber space and in making sure that we can use it where we want to use it properly and legally. It鈥檚 not a single-focused problem for one group of people.鈥

bookmarks move script

Current Headlines Sidebar
Asset Publisher

empty content

 

Media contact box

MEDIA CONTACT
 

Office of University Communications
1 University Circle
Monterey, CA 93943
(831) 656-1068

pao@nps.edu