Operation DONUTS: Defensive Offensive Networking Utilizing Targeted Supervision
Date of Award
Spring 2020
Degree Name
Bachelor of Science
Department
Computer Science & Mathematics; College of Arts & Sciences
First Advisor
Dr. Vitaly Ford
Abstract
In response to the increased number of cyber-attacks and threats the U.S. faces, cybersecurity as well as appropriate cyber legislation laws have been reviewed and created to try and secure the country’s diverse cyber networks. However, with the constantly changing threats and vulnerabilities, simply responding to a cyber threat reactively is costing companies billions. Surveillance laws and various amendments hamper cyber-security organizations from properly adapting and preparing for cyber-attacks. So, under what circumstances would offensive cyber operations be justifiable as a reasonable defensive strategy?
Recommended Citation
Villafuerte, Andres; McCloy, Viktor; and Choi, Chris, "Operation DONUTS: Defensive Offensive Networking Utilizing Targeted Supervision" (2020). Capstone Showcase. 9.
https://scholarworks.arcadia.edu/showcase/2020/comp_sci_math/9
Operation DONUTS: Defensive Offensive Networking Utilizing Targeted Supervision
In response to the increased number of cyber-attacks and threats the U.S. faces, cybersecurity as well as appropriate cyber legislation laws have been reviewed and created to try and secure the country’s diverse cyber networks. However, with the constantly changing threats and vulnerabilities, simply responding to a cyber threat reactively is costing companies billions. Surveillance laws and various amendments hamper cyber-security organizations from properly adapting and preparing for cyber-attacks. So, under what circumstances would offensive cyber operations be justifiable as a reasonable defensive strategy?