MILITARY MANAGEMENT QUARTERLY

MILITARY MANAGEMENT QUARTERLY

Strategic Model of Evaluation of Cyber Operations

Document Type : Research Paper

Authors
1 Ph.D. Candidate in Strategic Management of Cyberspace, Cyber Security, Supreme National Defense University, Tehran, Iran, (* Corresponding Author); h.rahimov98@sndu.ac.ir
2 Assistant Professor, Supreme National Defense University, Tehran, Iran
10.22034/iamu.2021.137430.2462
Abstract
Today, cyber defense strategy is prevalent in many leading countries. The basis of this type of defense is mastery of cyberspace and the ability to perform cyber operations. This ability in addition to creating a cyber deterrent, enabling countries to eliminate the threat before it becomes actual. Due to the intangibility of cyberspace and invisibility of the purpose of cyber operations, it is difficult to understand the success of the operation. Measuring this success requires evaluating cyber operations. By evaluating cyber operations, the performance and effectiveness of operations can be measured, weaknesses and strengths can be found, and steps can be taken to eliminate weaknesses and improve strengths. In order to carry out an accurate, comprehensive and scientific evaluation of cyber operations, a strategic model is needed. In this study, a mixed approach (quantitative and qualitative) has been used to provide a strategic model for evaluating cyber operations. In this regard, 70 questionnaires conducted among commanders, managers and experts at the strategic, operational and tactical levels of the country's cyber operations. Based on the research and by using the opinion of experts, three concepts of “design evaluation”, “combat preparedness evaluation” and “performance evaluation” were identified as the basic dimensions of cyber operations evaluation. Then, the components of each of these dimensions were extracted and the indicators of them were determined. Finally, a strategic model for evaluating cyber operations in three dimensions, ten components and seventy-three indicators is presented after statistical analysis of the results of the questionnaires.
Keywords

جبار‌رشیدی، ‌علی، شکیبازاد، ‌محمد. (1396). مدل‌سازی و شبیه‌سازی صحنه نبرد سایبری، مدیریت فناوری اطلاعات. 33-9) 809828.(
جمالی، احمدمهدی، پرتوی، محمدتقی، پورجعفری، مرتضی. (1399). عملکرد مرکز بازسازی و بهینه‌سازی یا علی (ع) هوانیروز در ارتقاء آمادگی رزمی آجا. علوم و فنون نظامی، 16(51), 103-126.‎
رضاییان، علی (1386). مبانی سازمان و مدیریت، تهران، سمت، چاپ دهم
شفیع پور، ب. پورقهرمانی، د. ب. (1393). تهدیدهای سایبری علیه ایران و چالش مقابله با آن. همایش ملی ایران و چالش‌های حقوقی بین‌المللی. دانشگاه آزاد اسلامی واحد مراغه
فروردین، و. سملی, ا., عمویی, ح. (1397). بررسی تأثیرات جنگ سایبری بر امنیت ملی در جمهوری اسلامی ایران. کنفرانس بین‌المللی امنیت، پیشرفت و توسعه پایدار مناطق مرزی، سرزمینی و کلان‌شهرها، راهکارها و چالش‌ها با محوریت پدافند غیرعامل و مدیریت بحران. دانشگاه افسری امام علی (ع)
کرم روان، ف. (1398). تحلیل حقوقی سند راهبردی پدافند سایبری کشور. دومین کنفرانس ملی پدافند سایبری. دانشگاه آزاد اسلامی واحد مراغه
مدنی، سید مصطفی، آبسالان، محمد. (1394). تأثیر رهبری تحول‌آفرین بر ارتقاء توان رزمی در یک سازمان دفاعی. فصلنامه مدیریت نظامی، 15(59), 32-58.‎
AFDD. (2011). Air Force Doctrine Document (AFDD) 3-12, 15 Jul 2010. Incorporating Change, 1, 30.
Department of the Army. (2019). Army Doctrine Publication 5-0 - The Operations Process. Joint Publication 5-0, 23. https://armypubs.army.mil/%0Ahttps://atiam.train.army.mil/catalog/dashboard
DoD. (2014). Information Operations - Joint Publication 3-13.:Information Operations, 1(1), 1–87. https://doi.org/10.1016/j.jalz.2006.05.1401
DoD. (2017). JP 5-0. Joint Chiefs of Staff 2017, June 16, viewed 18 April 2018.
DoD. (2018). Cyberspace Operations. Department of Defense United States.
DoD. (2020). DoD dictionary of military and associated terms. Joint Publication, 1–2.
Dressler, J. (2015). Analyzing the use of cyber in warfare at the strategic, operational, and tactical levels.
Eom, J. H. (2014). Roles and responsibilities of cyber intelligence for cyber operations in cyberspace. 8, 323–332. https://doi.org/10.14257/ijsia.2014.8.5.29
Haataja, S. (2020). Cyber Operations and Collective Countermeasures under International Law. In Journal of Conflict and Security Law (Vol. 25, Issue 1, pp. 33–51). https://doi.org/10.1093/jcsl/kraa003
Maathuis, C. Pieters, W. & van den Berg, J. (2020). Decision support model for effects estimation and proportionality assessment for targeting in cyber operations. Defence Technology.
Smeets, M. (2020). US cyber strategy of persistent engagement & defend forward: implications for the alliance and intelligence collection. Intelligence and National Security, 35(3), 444–453.
Smeets, M. & Work, J. D. (2020). Operational Decision-Making for Cyber Operations. The Cyber Defense Review, 5(1), 95-114.
TRADOC (U.S. Army Training and Doctrine Command). (2016). ATP 3-92 Corps Operations. April, 278.
Williams, B. T. (2014). The Joint Force Commander’s Guide to Cyberspace Operations. Joint Forces Quarterly, 73(2), 12–19. http://ndupress.ndu.edu/Portals/68/Documents/jfq/jfq-73/jfq-73_12-19_Williams.pdf?ver=2014-04-01-122156-563%5Cnhttp://ndupress.ndu.edu/Media/News/Article/577499/jfq-73-the-joint-force-commanders-guide-to-cyberspace-operations/