Fig. 1 Cyber Kill Chain Model
Fig. 2 Joint force commander objectives
Table. 1 Target management requirement ability
Table. 2 Operation enforcement procedure
Table. 3 CIPOE Procedure
References
- Department of Defense. Cyber Strategy. [Internet]. Available : https://media.defense.gov/2018/Sep/18/2002041658/-1/-1/1/CYBER_STRATEGY_SUMMARY_FINAL.PDF. 2018.
- E. M. Hutchins, L. Martin, "Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains," 2011.
- J. W. Yoo, and D. W. Park, "Cyber kill chain strategy for hitting attacker origin," Journal of the Korea Institute of Information and Communication Engineering, vol. 21, no. 11, pp. 3, Nov. 2017.
- Department of Defense. (2015). Cybersecurity Test and Evaluation Guidebook. Version 1.0, 2015.
- U.S. Joint Chief of Staff. Cyberspace Operations. (JP 3-12). 2018.
- U.S. ARMY, CYBER OPERATIONS OFFICER, CAREERS & JOBS [Internet]. Available : https://www.goarmy.com/careers-and-jobs/browse-career-and-job-categories/computers-and-technology/cyber-operations-officer.html. 2017.
- U.S. Army. Operations. (FM 3-0). 2017.
- Headquaters, Department of the Army. Cyberspace and Electronic Warfare Operations (FM 3-12) [Internet]. Available : https://fas.org/irp/doddir/army/fm3-12.pdf. 2017.