Manoeuvre Warfare and Cyber Operations in Cloud Computing Era
VerifiedAdded on 2023/04/21
|7
|1466
|483
Report
AI Summary
This report provides an analysis of manoeuvre warfare and cyber operations, particularly focusing on the utilization of cloud computing resources. It discusses how manoeuvre warfare can be applied within a 21st-century information security model, especially for modern SMEs operating natio...

Running head: MANOEUVRE WARFARE AND CYBER OPERATIONS
MANOEUVRE WARFARE AND CYBER OPERATIONS
Name of the Student:
Name of the University:
Author Note:
MANOEUVRE WARFARE AND CYBER OPERATIONS
Name of the Student:
Name of the University:
Author Note:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

1MANOEUVRE WARFARE AND CYBER OPERATIONS
Paper critique
The paper is about Manoeuvre Warfare operation using the cloud architecture. The paper
states the utilization of the information security model through the modern SME operations. In
order to do this the paper states the operations of securing the digital assets and embedding
strategy in the Computer Network operations. According to this paper, this can provide an
efficient and cost effective security model in the organization (Campbell 2018). In order to
discuss the significance of this technique, this paper has identified different security
vulnerabilities in the computer network. In this context, difference in the security operations are
discussed. This paper has discussed about the manoeuvre warfare in the context of cloud
resource and its significance in the mitigation of the threats.
Manoeuvre operations and principals:
In cyber security maneuver is the technique to capture the information then destroy or
manipulate that information in order to gain competitive advantage (Campbell 2018). Manoeuvre
is a war fighting technique. However,in the cyber security, manoeuvre is a technique where the
application force is happened at the point of attack or defense.
Manoeuvre operations:
The main operation of manoeuvre is to employ the attack or defense in order to protect
the cyber resources. Mainly, this technique is imposed o take the technical advantage in the
cyber space. Manoeuvre can be a piece of code which is employed to fulfill the objective of
attackers or defenders at the time targeted virtual space.
Paper critique
The paper is about Manoeuvre Warfare operation using the cloud architecture. The paper
states the utilization of the information security model through the modern SME operations. In
order to do this the paper states the operations of securing the digital assets and embedding
strategy in the Computer Network operations. According to this paper, this can provide an
efficient and cost effective security model in the organization (Campbell 2018). In order to
discuss the significance of this technique, this paper has identified different security
vulnerabilities in the computer network. In this context, difference in the security operations are
discussed. This paper has discussed about the manoeuvre warfare in the context of cloud
resource and its significance in the mitigation of the threats.
Manoeuvre operations and principals:
In cyber security maneuver is the technique to capture the information then destroy or
manipulate that information in order to gain competitive advantage (Campbell 2018). Manoeuvre
is a war fighting technique. However,in the cyber security, manoeuvre is a technique where the
application force is happened at the point of attack or defense.
Manoeuvre operations:
The main operation of manoeuvre is to employ the attack or defense in order to protect
the cyber resources. Mainly, this technique is imposed o take the technical advantage in the
cyber space. Manoeuvre can be a piece of code which is employed to fulfill the objective of
attackers or defenders at the time targeted virtual space.

2MANOEUVRE WARFARE AND CYBER OPERATIONS
Cyber Manoeuvre can be offensive and defensive. Offensive cyber manoeuvre includes the
exploitation of information through strategically capturing and manipulating the information.
Defensive manoeuvre includes creating defensive parameter in order to protect the information
and data.
Manoeuvre principals:
Manoeuvre is a principal of war. In cyber space and security, Manoeuvre is used to influence
the decisison making system and o the human behavior and machines through the application of
force. Some of the characteristics those reflects the principals of cyber manoeuvre are-
Speed: One of the main principal of cyber manoeuvre is the speed of occurance of this
technique. The actions through the application of manoeuvre are instantaneous. The
speed at which the functioning of this technique occurs makes it impossible to other
entity to prevent the action (Meekin 2016). It has been seen, that by the time the damage
or manipulation has been discovered and the mitigation measures has been taken, data
from the other part are already attacked through manoeuvre.
Operational reach: Cyber manoeuvre has vast operational reach. In the virtual cyber
space, the operational reach cannot be restricted easily.
Control and access: The main principal of manoeuvre is to gain the access of the target
system or code and control its functioning (Sherry 2018). The exploitation of data and the
manipulation of the automated decision making are done under the control of
kmanoeuvre attack.
Dynamic evaluation: The technologies used in the cyberspace are dynamic and evolving.
In present days the use of the web based application and the cloud computing using the
Cyber Manoeuvre can be offensive and defensive. Offensive cyber manoeuvre includes the
exploitation of information through strategically capturing and manipulating the information.
Defensive manoeuvre includes creating defensive parameter in order to protect the information
and data.
Manoeuvre principals:
Manoeuvre is a principal of war. In cyber space and security, Manoeuvre is used to influence
the decisison making system and o the human behavior and machines through the application of
force. Some of the characteristics those reflects the principals of cyber manoeuvre are-
Speed: One of the main principal of cyber manoeuvre is the speed of occurance of this
technique. The actions through the application of manoeuvre are instantaneous. The
speed at which the functioning of this technique occurs makes it impossible to other
entity to prevent the action (Meekin 2016). It has been seen, that by the time the damage
or manipulation has been discovered and the mitigation measures has been taken, data
from the other part are already attacked through manoeuvre.
Operational reach: Cyber manoeuvre has vast operational reach. In the virtual cyber
space, the operational reach cannot be restricted easily.
Control and access: The main principal of manoeuvre is to gain the access of the target
system or code and control its functioning (Sherry 2018). The exploitation of data and the
manipulation of the automated decision making are done under the control of
kmanoeuvre attack.
Dynamic evaluation: The technologies used in the cyberspace are dynamic and evolving.
In present days the use of the web based application and the cloud computing using the

3MANOEUVRE WARFARE AND CYBER OPERATIONS
cloud resources have been increased (Chen and Dinerman 2016). In this case, the
application of manoeuvre attack to gain the access of the resources has become one of the
popular way. In this case, the offensive manoeuvre attacks are becoming more advanced.
On the other hand the advancement of the defensive manoeuvre has become important.
Limited attribution: Limited attribution is one of the principal of manoeuvre warfare. In
this case, it is difficult to identify the actor behind the attacks.
Distributive nature: Most if the manoeuvre attacks have distributive nature. In this
technique the attackers and defenders can take simultaneous actions to prevent the
consequences of each other’s action at different level of the network (Hammock 2017).
For defenders , the main goal is to identify the threats, on the other hand, main aim of the
attackers is to find the vulnerabilities of the system. The attackers can attack multiple
system at a time. This distributed non serial nature of this technique can create dilemmas
for defending units.
Cyber operations in the modern environment:
The cyber operation at present day consists of defending of the resources and information
stored in the system. With the advancement of technology, the use of emerging techniques are
deployed in the cyberspace. One of the uses of advances technology is the use of cloud as the
storage of resources (Konečný,Janková and Dvořák 2017). It has been seen that the modern
practices in cyberspace are increasing the threats or vulnerabilities of the system (Wood 2018).
Incidents of data breaching is the main threat for the individuals and the organizations. The
natures of vulnerabilities are changing rapidly with the advancement of technology. In this
context, it is required that the defense mechanisms against these threats are improved
(Ducheine,van Haaster and van Harskamp 2017). In today’s socially driven environment, the
cloud resources have been increased (Chen and Dinerman 2016). In this case, the
application of manoeuvre attack to gain the access of the resources has become one of the
popular way. In this case, the offensive manoeuvre attacks are becoming more advanced.
On the other hand the advancement of the defensive manoeuvre has become important.
Limited attribution: Limited attribution is one of the principal of manoeuvre warfare. In
this case, it is difficult to identify the actor behind the attacks.
Distributive nature: Most if the manoeuvre attacks have distributive nature. In this
technique the attackers and defenders can take simultaneous actions to prevent the
consequences of each other’s action at different level of the network (Hammock 2017).
For defenders , the main goal is to identify the threats, on the other hand, main aim of the
attackers is to find the vulnerabilities of the system. The attackers can attack multiple
system at a time. This distributed non serial nature of this technique can create dilemmas
for defending units.
Cyber operations in the modern environment:
The cyber operation at present day consists of defending of the resources and information
stored in the system. With the advancement of technology, the use of emerging techniques are
deployed in the cyberspace. One of the uses of advances technology is the use of cloud as the
storage of resources (Konečný,Janková and Dvořák 2017). It has been seen that the modern
practices in cyberspace are increasing the threats or vulnerabilities of the system (Wood 2018).
Incidents of data breaching is the main threat for the individuals and the organizations. The
natures of vulnerabilities are changing rapidly with the advancement of technology. In this
context, it is required that the defense mechanisms against these threats are improved
(Ducheine,van Haaster and van Harskamp 2017). In today’s socially driven environment, the
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

4MANOEUVRE WARFARE AND CYBER OPERATIONS
information is the form of communication between two or more parties. The exchange of
information is happening through the cyberspace in different forms. The presentation of the
information exchange can be categorized into three parts- psychological operations, military
deception and operational security.
In order to protect the security of the information in the cyber space , different technologies and
techniques are invented (Hammock 2017). Apart from the usage of the antivirus software and
firewall, deception and manoeuvre techniques are used. The principals of using deception
technique are-
Affect the motivation of the attackers
Affect the opportunities for the attackers for attacking the system. This can be done
through the implementation of the security protocols in the system.
Affect the capability of the attackers for attacking the system. This can be done through
the upgrade of patches and using latest technology.
The overall discussion has given the overview of the manoeuvre warfare and its application
in the cyber space. It can be said as an emerging technique for maintaining the cyber security
which is based on the certain principal. However, the effectiveness of the technique is
dependent on the intention of the users who are using it.
information is the form of communication between two or more parties. The exchange of
information is happening through the cyberspace in different forms. The presentation of the
information exchange can be categorized into three parts- psychological operations, military
deception and operational security.
In order to protect the security of the information in the cyber space , different technologies and
techniques are invented (Hammock 2017). Apart from the usage of the antivirus software and
firewall, deception and manoeuvre techniques are used. The principals of using deception
technique are-
Affect the motivation of the attackers
Affect the opportunities for the attackers for attacking the system. This can be done
through the implementation of the security protocols in the system.
Affect the capability of the attackers for attacking the system. This can be done through
the upgrade of patches and using latest technology.
The overall discussion has given the overview of the manoeuvre warfare and its application
in the cyber space. It can be said as an emerging technique for maintaining the cyber security
which is based on the certain principal. However, the effectiveness of the technique is
dependent on the intention of the users who are using it.

5MANOEUVRE WARFARE AND CYBER OPERATIONS
References
Campbell, P., 2018. Generals in Cyberspace: Military Insights for Defending
Cyberspace. Orbis, 62(2), pp.262-277.
Meekin, S., 2016. 2016 Blamey Oration: The cyber and space domains in 21st century
warfare. United Service, 67(3), p.9.
Ducheine, P.A., van Haaster, J. and van Harskamp, R., 2017. Manoeuvring and Generating
Effects in the Information Environment. In Netherlands Annual Review of Military Studies
2017 (pp. 155-179). TMC Asser Press, The Hague.
Hammock, C.J., 2017. Enabling the Development and Deployment of NATO Cyber
Operations: An Analysis of Modern Cyber Warfare Operations and Thresholds of Global
Conflict. Journal of Information Warfare, 16(3), pp.79-94.
Wood, D.G., 2018. The Application of Warden’s Concentric Ring Theory to Applegate’s
Offensive Cyber Manoeuvre Strategy in Modern Conflicts. In Security by Design (pp. 221-
252). Springer, Cham.
Konečný, J., Janková, M. and Dvořák, J., 2017. Modelling of processes of logistics in
cyberspace security. In MATEC Web of Conferences (Vol. 134, p. 00025). EDP Sciences.
Sherry, C.S., 2018. Fertile Octogenarians in Cyberspace: Why and How to Use Technology
to Connect the Law School Classroom to Legal Practice.
Chen, J. and Dinerman, A., 2016, July. On cyber dominance in modern warfare. In European
Conference on Cyber Warfare and Security (p. 52). Academic Conferences International
Limited.
References
Campbell, P., 2018. Generals in Cyberspace: Military Insights for Defending
Cyberspace. Orbis, 62(2), pp.262-277.
Meekin, S., 2016. 2016 Blamey Oration: The cyber and space domains in 21st century
warfare. United Service, 67(3), p.9.
Ducheine, P.A., van Haaster, J. and van Harskamp, R., 2017. Manoeuvring and Generating
Effects in the Information Environment. In Netherlands Annual Review of Military Studies
2017 (pp. 155-179). TMC Asser Press, The Hague.
Hammock, C.J., 2017. Enabling the Development and Deployment of NATO Cyber
Operations: An Analysis of Modern Cyber Warfare Operations and Thresholds of Global
Conflict. Journal of Information Warfare, 16(3), pp.79-94.
Wood, D.G., 2018. The Application of Warden’s Concentric Ring Theory to Applegate’s
Offensive Cyber Manoeuvre Strategy in Modern Conflicts. In Security by Design (pp. 221-
252). Springer, Cham.
Konečný, J., Janková, M. and Dvořák, J., 2017. Modelling of processes of logistics in
cyberspace security. In MATEC Web of Conferences (Vol. 134, p. 00025). EDP Sciences.
Sherry, C.S., 2018. Fertile Octogenarians in Cyberspace: Why and How to Use Technology
to Connect the Law School Classroom to Legal Practice.
Chen, J. and Dinerman, A., 2016, July. On cyber dominance in modern warfare. In European
Conference on Cyber Warfare and Security (p. 52). Academic Conferences International
Limited.

6MANOEUVRE WARFARE AND CYBER OPERATIONS
1 out of 7
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.