{"title":"Net force maneuver - a JTF-GNO construct","authors":"C. Hunt, J. R. Bowes, D. Gardner","doi":"10.1109/IAW.2005.1495982","DOIUrl":null,"url":null,"abstract":"It would seem that few would willingly choose a battle of attrition, but it is a reasonable characterization of our defensive computer network strategy today, with one major caveat. When it comes to our sensitive but unclassified military computer networks, with the exception of an occasional arrest, our adversaries are able to inflict a substantial amount of harassment and a measurable amount of damage at practically no cost to themselves. It's probably only a slight exaggeration to say we are fighting an attrition battle where we are the only ones being attrited. This paper examines ways to leverage our ability to control the battlespace (our networks) to protect our critical information while engaging the enemy on the battleground of our choosing.","PeriodicalId":252208,"journal":{"name":"Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop","volume":"3 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IAW.2005.1495982","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
It would seem that few would willingly choose a battle of attrition, but it is a reasonable characterization of our defensive computer network strategy today, with one major caveat. When it comes to our sensitive but unclassified military computer networks, with the exception of an occasional arrest, our adversaries are able to inflict a substantial amount of harassment and a measurable amount of damage at practically no cost to themselves. It's probably only a slight exaggeration to say we are fighting an attrition battle where we are the only ones being attrited. This paper examines ways to leverage our ability to control the battlespace (our networks) to protect our critical information while engaging the enemy on the battleground of our choosing.