Blockchains in National Defense: Trustworthy Systems in a Trustless World - The Evolving Cyber Threat, Air Force Should Research and Develop Blockchain Technology to Reduce Probability of Compromise Blockchains in National Defense: Trustworthy Systems in a Trustless World - The Evolving Cyber Threat, Air Force Should Research and Develop Blockchain Technology to Reduce Probability of Compromise

Blockchains in National Defense: Trustworthy Systems in a Trustless World - The Evolving Cyber Threat, Air Force Should Research and Develop Blockchain Technology to Reduce Probability of Compromise

    • $10.99
    • $10.99

Publisher Description

This report has been professionally converted for accurate flowing-text e-book format reproduction. The ability of the USAF to prevail in the highly contested environment of 2040 will be dictated by its ability to defend cyber-enabled systems, and the data within them, from compromise and manipulation. Yet contemporary cyber defense is faltering, and incremental improvements seem unlikely to overcome an exponentially growing cyber threat. Thus, an entirely new model for cyber defense strategy is needed. Blockchains are a new information technology that inverts the cyber security paradigm. First, blockchain networks are trustless; they assume compromise of the network by both insiders and outsiders. Second, blockchains are transparently secure; they do not rely on failure-prone secrets, but rather on a cryptographic data structure that makes tampering both exceptionally difficult and immediately obvious. Finally, blockchains networks are fault tolerant; they align the efforts of honest nodes to reject those that are dishonest. As a result, blockchain networks not only reduce the probability of compromise, but also impose significantly greater costs on an adversary to achieve it. The Air Force should research and develop blockchain technology and leverage it for national defense.

This compilation includes a reproduction of the 2019 Worldwide Threat Assessment of the U.S. Intelligence Community.

The concept of data-fighting is not new. In An Organic Design for Command and Control, Boyd describes conflict as a competition of OODA loops, with victory favoring the actor that can execute OODA cycles faster and with less internal friction than an adversary. While Boyd's model espouses the benefits of injecting friction into an adversary's decision process, it also promotes the benefit of making one's own process resilient to hostile action. The concept of data-fighting can also be related to the doctrine of counterair, which Air Force Doctrine Annex 3-01 defines as "the integration of offensive and defensive operations to attain and maintain a desired degree of control of the air and protection by neutralizing or destroying enemy aircraft and missiles." Similarly, data-fighting could be described as the integration of offensive and defensive operations to attain and maintain a desired degree of control of the ability to generate, store, disseminate, process, analyze, and exploit information and protection by neutralizing the enemy's interfering action. Counterair's concept of control, which "describes a level of influence in [a] domain relative to that of an adversary," has important implications for data-fighting.4 Control exists on a spectrum ranging from parity in the center to superiority and supremacy by either belligerent at the extreme. Thus, in data-fighting, until an adversary achieves supremacy an actor retains some ability to data-fight.

GENRE
Computing & Internet
RELEASED
2019
26 July
LANGUAGE
EN
English
LENGTH
98
Pages
PUBLISHER
Progressive Management
SELLER
Draft2Digital, LLC
SIZE
558.9
KB

More Books Like This

For the Common Defense of Cyberspace: Implications of a U.S. Cyber Militia on Department of Defense Cyber Operations - Is Threat Overblown, Privateers, Contractors, Legal Overview, Operating Concept For the Common Defense of Cyberspace: Implications of a U.S. Cyber Militia on Department of Defense Cyber Operations - Is Threat Overblown, Privateers, Contractors, Legal Overview, Operating Concept
2017
Wired Fast and Thinking Slow: Cyber Technology and the U.S. Army - Increase in Speed and Quantity of Social Transactions, Inadequate Coverage of Implications of Cyberspace Through Military Doctrine Wired Fast and Thinking Slow: Cyber Technology and the U.S. Army - Increase in Speed and Quantity of Social Transactions, Inadequate Coverage of Implications of Cyberspace Through Military Doctrine
2018
Time Sensitivity in Cyberweapon Reusability: Stealth as a Critical Attribute Allowing Weaponized Software Code to be Reused, Survivability That Delays Detection to Prevent Vulnerability Patching Time Sensitivity in Cyberweapon Reusability: Stealth as a Critical Attribute Allowing Weaponized Software Code to be Reused, Survivability That Delays Detection to Prevent Vulnerability Patching
2018
Information Warfare Information Warfare
2012
Cyber Conflict Cyber Conflict
2013
CYBERSECURITY AND LEGAL-REGULATORY ASPECTS CYBERSECURITY AND LEGAL-REGULATORY ASPECTS
2021

More Books by Progressive Management

21st Century U.S. Military Manuals: Sniper Training - FM 23-10 - Marksmanship, Equipment, Ballistics, Weapon Capabilities, Sniping Techniques (Value-Added Professional Format Series) 21st Century U.S. Military Manuals: Sniper Training - FM 23-10 - Marksmanship, Equipment, Ballistics, Weapon Capabilities, Sniping Techniques (Value-Added Professional Format Series)
2011
The Smell of Kerosene: A Test Pilot's Odyssey - NASA Research Pilot Stories, XB-70 Tragic Collision, M2-F1 Lifting Body, YF-12 Blackbird, Apollo LLRV Lunar Landing Research Vehicle (NASA SP-4108) The Smell of Kerosene: A Test Pilot's Odyssey - NASA Research Pilot Stories, XB-70 Tragic Collision, M2-F1 Lifting Body, YF-12 Blackbird, Apollo LLRV Lunar Landing Research Vehicle (NASA SP-4108)
2012
21st Century Essential Guide to U.S. Navy SEALs (Sea, Air, Land), Special Warfare Command, Special Operations Forces, Training, Weapons, Tactics, Dogs, Vehicles, History, bin Laden Killing 21st Century Essential Guide to U.S. Navy SEALs (Sea, Air, Land), Special Warfare Command, Special Operations Forces, Training, Weapons, Tactics, Dogs, Vehicles, History, bin Laden Killing
2011
2011 Complete Guide to IEDs: Improvised Explosive Devices: Enemy Tactics, Roadside Bombs, Counter-IED Targeting, Defeat the Device, Programs, Technologies, Afghanistan, Iraq, JIEDDO 2011 Complete Guide to IEDs: Improvised Explosive Devices: Enemy Tactics, Roadside Bombs, Counter-IED Targeting, Defeat the Device, Programs, Technologies, Afghanistan, Iraq, JIEDDO
2010
Federal Bureau of Investigation (FBI) Handbook of Forensic Services, 2007 Edition - Crime Scene Forensics and Criminal Evidence Collection and Handling Procedures Federal Bureau of Investigation (FBI) Handbook of Forensic Services, 2007 Edition - Crime Scene Forensics and Criminal Evidence Collection and Handling Procedures
2010
Apollo and America's Moon Landing Program: Apollo 11 Official NASA Mission Reports and Press Kit Apollo and America's Moon Landing Program: Apollo 11 Official NASA Mission Reports and Press Kit
2011