Operation DONUTS: Defensive Offensive Networking Utilizing Targeted Supervision

Date of Award

Spring 2020

Degree Name

Bachelor of Science

Department

Computer Science & Mathematics; College of Arts & Sciences

First Advisor

Dr. Vitaly Ford

Abstract

In response to the increased number of cyber-attacks and threats the U.S. faces, cybersecurity as well as appropriate cyber legislation laws have been reviewed and created to try and secure the country’s diverse cyber networks. However, with the constantly changing threats and vulnerabilities, simply responding to a cyber threat reactively is costing companies billions. Surveillance laws and various amendments hamper cyber-security organizations from properly adapting and preparing for cyber-attacks. So, under what circumstances would offensive cyber operations be justifiable as a reasonable defensive strategy?

This document is currently not available here.

Share

COinS
 

Operation DONUTS: Defensive Offensive Networking Utilizing Targeted Supervision

In response to the increased number of cyber-attacks and threats the U.S. faces, cybersecurity as well as appropriate cyber legislation laws have been reviewed and created to try and secure the country’s diverse cyber networks. However, with the constantly changing threats and vulnerabilities, simply responding to a cyber threat reactively is costing companies billions. Surveillance laws and various amendments hamper cyber-security organizations from properly adapting and preparing for cyber-attacks. So, under what circumstances would offensive cyber operations be justifiable as a reasonable defensive strategy?