59,99 €
inkl. MwSt.
Versandkostenfrei*
Versandfertig in über 4 Wochen
payback
30 °P sammeln
  • Broschiertes Buch

The dramatic increase in reliance on cyberspace over the last decade for US military operations resulted in the creation of the sub-unified command, US Cyber Command (USCYBERCOM). Its mission is to operate and defend the global information grid and conduct full-spectrum cyberspace operations, if required. However, the regional combatant commands see cyberspace as another operational domain that they want and need to integrate with the physical domains of air, land, sea, and space. These two perspectives are at odds with each other with respect to the optimal command and control structure for…mehr

Produktbeschreibung
The dramatic increase in reliance on cyberspace over the last decade for US military operations resulted in the creation of the sub-unified command, US Cyber Command (USCYBERCOM). Its mission is to operate and defend the global information grid and conduct full-spectrum cyberspace operations, if required. However, the regional combatant commands see cyberspace as another operational domain that they want and need to integrate with the physical domains of air, land, sea, and space. These two perspectives are at odds with each other with respect to the optimal command and control structure for cyberspace. The challenge is to develop a command and control structure that allows USCYBERCOM to execute its global responsibilities while also allowing the geographic commanders the ability to effectively integrate cyber operations into their plans and operations. Two predominant models have emerged: the USSOCOM model and the USTRANSCOM model, the former being a very regionally focused structure, while the latter being very centrally focused. In order to determine the best command and control structure for cyberspace within DoD, the author conducted interviews throughout USCYBERCOM, its service components, and several of the unified commands. Additionally the author observed a table top cyber exercise in preparation for USPACOM's annual Exercise Terminal Fury. The author concludes that a hybrid model with features of the USSOCOM model and the USTRANSCOM model best takes into account the global nature of cyberspace, while enabling integration of regional cyber effects.