SlideShare a Scribd company logo
Cyberspace-New Operational field of confrontations
Papadakis Konstantinos, Cyber- Information Warfare Analyst & Cyber Defense/Security Consultant
Cyberspace
New Operational field of confrontations
Technological progress gives mankind the advantage of easily carrying out of
all kinds of activities through system interconnection (networking), causing increasing
dependency on smooth and seamless operation of these systems.
This advantage, under specific conditions could turn into a vulnerability.
A vulnerability, as the single, continuous, dynamic set of interconnected systems
(people, information systems, computer networks, communications, databases,
information, software, equipment and processes), which is used in every field of human
activities (military, political, economic, social, etc.), is vulnerable partly or as a whole to
threats that have arisen, as a consequence of this very interconnection.
These threats may stem from individuals, organized groups, or even from states,
while the risk they (threats) represent is directly proportional, among other things, to
the breadth of networking combined with the development of broadband as well as
the criticality of the activities it supports.
With emphasis on the last decade and in combination with the so-called
"globalization", the dominant pillar of which is the extensive use of technology and in
particular the Internet, a new man-made (non- physical) , "field of confrontation"
analogous and overlapping to the existing physical spaces/fields (land, sea, air, space)
was created, the cyberspace.
Cyberspace can be defined as:
Cyberspace-New Operational field of confrontations
Papadakis Konstantinos, Cyber- Information Warfare Analyst & Cyber Defense/Security Consultant
"...The global domain consisting of all interconnected communication,
information and other electronic systems, networks and their data, including those that
are separate or independent, that process, store or transmit data...".
Cyberspace can be considered as a multi-dimensional space that takes shape
on three levels with their respective components:
(1) Physical Layer
(2) Logical Layer
(3) Social Layer-Social Layer
The new area of confrontation and the asymmetric threats arising from its
existence and use against adversary critical information infrastructures (civil or military)
make it an accessible low-cost strategic weapon and force multiplier, as it is possible
using this field to:
1. Attack part or whole country's Information Infrastructure and of course state’s
command and control system (political or military) that depends on it, without
requiring the existence of heavy industry, strategic reserves of raw materials or the
payment of high costs , regardless of geographical boundaries and with zero possibility
of human losses on the part of the attacker.
2. To occur, disruption of operations in Command and Control (C4I) systems,
financial systems, interception or alteration of information, questioning the reliability
of data and therefore confusion the decision-making procedures, financial burden,
increased staff workload, influence on public opinion, social unrest and possibly
natural disasters and human casualties.
Cyberspace constitutes the fifth dimension of confrontations with the difference
that it provides the right conditions for conducting a covert war, in which there is a
possibility that neither side recognizes that takes part in conflict or even that it has
been attacked, but even if it does recognize this, it is very difficult or even impossible
to clear identify the opponent, the area and the way he operates.
In particular, for military activity in the era of the "Information Revolution",
cyberspace is considered a new field, where various belligerent forces seek to prevail
over their adversaries. However, dominance in cyberspace is a complex issue, as it is
not equivalent to the dominance of a single material space (such as space or ground)
subject to the laws of nature, but instead it is about securing an advantageous position
in a complex human construction, which can be repeated and whose function is based
on the coordinated action of material elements, artificial rules and real data.
The generalized perception that Cyberspace is one and only, but also treating
the two terms (Cyberspace and Internet) as identical, without their interchange
implying any conceptual differentiation is a fallacy, as each individual electronic
system-network has the ability to creates its own cyberspace, within which the right of
access and the very existence of a user-actor should be recognized, so that his actions
acquire meaning and interact with the actions of others. Therefore, in the context of a
Cyberspace-New Operational field of confrontations
Papadakis Konstantinos, Cyber- Information Warfare Analyst & Cyber Defense/Security Consultant
conflict, it is crucial to ensure the sovereignty of the cyberspace in which each faction's
military target is located.
Cyberspace as an operational environment has several unique features:
1. It does not obey in space-time limitations since an action in or through it can
be performed in a short time (seconds), from significantly long distances (global
coverage) without requiring proximity to the opponent, and in most cases without
early warning.
2. Attribution for an aggressive action is extremely difficult , since the
perpetrators could act in disguise, hiding their real identity and goals.
3. The cost of developing cyber capabilities as well as conducting cyber
operations in this field is much lower, compared to the cost of conventional operations.
4. It contains constantly dynamically configured, huge amounts of high and/or
classified information of high value, in structured or unstructured form which are
mainly transmitted through commercial networks and without following the same path
from the issuer to the recipient, or the same safety standards.
5. It has created global conditions of dependence from it (according to
information technology degree of penetration in each state) to all forms of human
activity, since within or through it, daily actions take place that serve the total of
economic, business, communication, social, state, military activities of citizens and
states.
In order for respective groups to understand and analyze the unique
operational environment, cyberspace and cyber operations are inextricably linked with
the use of eight interrelated operational variables (political, economic, social, military,
informational, infrastructure, physical environment, time).
Under these circumstances and taking into account the phenomenal rate of
diffusion, evolution and penetration of information and communication technologies,
combined with the ever-increasing addition of critical infrastructure in this field, states
should:
1. Address cyber operations in terms of an "Asymmetric Threat" and as "Force
Multiplier" since the increasing state dependence on information and communication
technologies combined with the low cost of developing cyber-capabilities and the
severity of the damage which may cause, reducing them to a unique solution that
many adversaries can exploit in order to maintain the balance or gain some advantage
in terms of military power over an adversary.
2. Develop and use appropriate defense capabilities (cyber defense) in
cyberspace in order to protect national critical infrastructures.
3. Operate against a wide range of actors (Nation-states, state-sponsored
actors, non-state actors, legitimate enterprises, criminal organizations, and individuals,
etc.), with different levels of education, training, skills, motivations and abilities, which
is a significant change in traditional geopolitical and military perceptions of enemy and
Cyberspace-New Operational field of confrontations
Papadakis Konstantinos, Cyber- Information Warfare Analyst & Cyber Defense/Security Consultant
threat of a specific orientation (geographical, ideological, etc.) and requires a new
perspective in terms of operations as well as a different type of training.
4. Develop on a daily basis effective relationships and collaborations with all
actors (public, private, academic institutes, military forces) involved in the field of
cyberspace since this field is created, owned, maintained and operated by public,
private, and government agencies around the world, with the result that research, and
development carried out by these agencies will largely be the catalyst for changes in
cyberspace operations.
New trends want the field of cyberspace to be considered as a subset of the
wider information environment which also includes other fields such as the
electromagnetic spectrum, space, etc., and correspondingly cyberspace operations
integrated into information operations to achieve their maximum potential.

More Related Content

PDF
Cyber Operation Planning and Operational Design_Yayımlandı
PDF
Cyber defense: Understanding and Combating the Threat
PDF
Better Cyber Security Through Effective Cyber Deterrence_The Role of Active C...
PDF
USSTRATCOM Cyber & Space 2011 Herbert Lin
PPTX
The rise of cyberpower
PDF
C017361724
Cyber Operation Planning and Operational Design_Yayımlandı
Cyber defense: Understanding and Combating the Threat
Better Cyber Security Through Effective Cyber Deterrence_The Role of Active C...
USSTRATCOM Cyber & Space 2011 Herbert Lin
The rise of cyberpower
C017361724

Similar to Cyberspace_New Operational Domain (20)

PDF
The Cyberspace: Redefining A New World
PDF
Finland s cyber security strategy background dossier
PDF
Meeting national security_space_needs_in_the_contested_cyberspace_domain
PDF
Cyber-enabled Information Operations -- Inglis 04 27-17 -- SASC
PPTX
About Cyber.pptx
DOCX
1Running head CYBERWARCYBER WAR9Outstanding title.docx
PDF
Cybersecurity - Cooperation or Proliferation
PDF
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
PPTX
Cyber war a threat to indias homeland security 2015
PDF
Nation-State Cyber Offensive Capabilities 1st Edition Eduardo Izycki
PDF
Cyber Security Conference - Rethinking cyber-threat
PPTX
Wav Cyber Uk 2012 V2
PDF
Francesca Bosco, Le nuove sfide della cyber security
PPT
The cyber terrain
PDF
PDF
Delusions of-safety-cyber-savvy-ceo
PDF
Insa cyber intelligence_2011-1
PDF
Insa cyber intelligence 2011
PPTX
Honeypots in Cyberwar
PPTX
Cybersecurity Law and Policy II Slides for First Summit Meeting
The Cyberspace: Redefining A New World
Finland s cyber security strategy background dossier
Meeting national security_space_needs_in_the_contested_cyberspace_domain
Cyber-enabled Information Operations -- Inglis 04 27-17 -- SASC
About Cyber.pptx
1Running head CYBERWARCYBER WAR9Outstanding title.docx
Cybersecurity - Cooperation or Proliferation
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
Cyber war a threat to indias homeland security 2015
Nation-State Cyber Offensive Capabilities 1st Edition Eduardo Izycki
Cyber Security Conference - Rethinking cyber-threat
Wav Cyber Uk 2012 V2
Francesca Bosco, Le nuove sfide della cyber security
The cyber terrain
Delusions of-safety-cyber-savvy-ceo
Insa cyber intelligence_2011-1
Insa cyber intelligence 2011
Honeypots in Cyberwar
Cybersecurity Law and Policy II Slides for First Summit Meeting
Ad

More from Papadakis K.-Cyber-Information Warfare Analyst & Cyber Defense/Security Consultant-Hellenic MoD (20)

DOCX
DOCX
Υβριδικός πόλεμος και Υβριδικές απειλές Hybrid Warfare and Hybrid Threats
DOCX
Τεχνητή νοημοσύνη & Ηλεκτρονικός πόλεμος
PDF
Russia Ukraine War_Cyberspace Operations (2020-2023)-ΡώσοΟυκρανικός πόλεμος-Ε...
DOCX
Ρωσία εναντίον Εσθονίας:ο πρώτος κυβερνοπόλεμος (2007)
DOCX
Κυβερνοχώρος: Νέο πεδίο αντιπαραθέσεων
DOCX
PDF
Russia Georgia 2008 Conflict-Information Operations, Cyberwarfare
PDF
ISMS-Information Security Management System-Σύστημα Διαχείρισης Πληροφοριακής...
Υβριδικός πόλεμος και Υβριδικές απειλές Hybrid Warfare and Hybrid Threats
Τεχνητή νοημοσύνη & Ηλεκτρονικός πόλεμος
Russia Ukraine War_Cyberspace Operations (2020-2023)-ΡώσοΟυκρανικός πόλεμος-Ε...
Ρωσία εναντίον Εσθονίας:ο πρώτος κυβερνοπόλεμος (2007)
Κυβερνοχώρος: Νέο πεδίο αντιπαραθέσεων
Russia Georgia 2008 Conflict-Information Operations, Cyberwarfare
ISMS-Information Security Management System-Σύστημα Διαχείρισης Πληροφοριακής...
Ad

Recently uploaded (20)

PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
A Presentation on Artificial Intelligence
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
Big Data Technologies - Introduction.pptx
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Machine learning based COVID-19 study performance prediction
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Empathic Computing: Creating Shared Understanding
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Encapsulation theory and applications.pdf
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
A Presentation on Artificial Intelligence
Reach Out and Touch Someone: Haptics and Empathic Computing
Spectral efficient network and resource selection model in 5G networks
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Encapsulation_ Review paper, used for researhc scholars
Unlocking AI with Model Context Protocol (MCP)
Big Data Technologies - Introduction.pptx
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Digital-Transformation-Roadmap-for-Companies.pptx
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Dropbox Q2 2025 Financial Results & Investor Presentation
Machine learning based COVID-19 study performance prediction
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Empathic Computing: Creating Shared Understanding
The Rise and Fall of 3GPP – Time for a Sabbatical?
Encapsulation theory and applications.pdf
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf
20250228 LYD VKU AI Blended-Learning.pptx

Cyberspace_New Operational Domain

  • 1. Cyberspace-New Operational field of confrontations Papadakis Konstantinos, Cyber- Information Warfare Analyst & Cyber Defense/Security Consultant Cyberspace New Operational field of confrontations Technological progress gives mankind the advantage of easily carrying out of all kinds of activities through system interconnection (networking), causing increasing dependency on smooth and seamless operation of these systems. This advantage, under specific conditions could turn into a vulnerability. A vulnerability, as the single, continuous, dynamic set of interconnected systems (people, information systems, computer networks, communications, databases, information, software, equipment and processes), which is used in every field of human activities (military, political, economic, social, etc.), is vulnerable partly or as a whole to threats that have arisen, as a consequence of this very interconnection. These threats may stem from individuals, organized groups, or even from states, while the risk they (threats) represent is directly proportional, among other things, to the breadth of networking combined with the development of broadband as well as the criticality of the activities it supports. With emphasis on the last decade and in combination with the so-called "globalization", the dominant pillar of which is the extensive use of technology and in particular the Internet, a new man-made (non- physical) , "field of confrontation" analogous and overlapping to the existing physical spaces/fields (land, sea, air, space) was created, the cyberspace. Cyberspace can be defined as:
  • 2. Cyberspace-New Operational field of confrontations Papadakis Konstantinos, Cyber- Information Warfare Analyst & Cyber Defense/Security Consultant "...The global domain consisting of all interconnected communication, information and other electronic systems, networks and their data, including those that are separate or independent, that process, store or transmit data...". Cyberspace can be considered as a multi-dimensional space that takes shape on three levels with their respective components: (1) Physical Layer (2) Logical Layer (3) Social Layer-Social Layer The new area of confrontation and the asymmetric threats arising from its existence and use against adversary critical information infrastructures (civil or military) make it an accessible low-cost strategic weapon and force multiplier, as it is possible using this field to: 1. Attack part or whole country's Information Infrastructure and of course state’s command and control system (political or military) that depends on it, without requiring the existence of heavy industry, strategic reserves of raw materials or the payment of high costs , regardless of geographical boundaries and with zero possibility of human losses on the part of the attacker. 2. To occur, disruption of operations in Command and Control (C4I) systems, financial systems, interception or alteration of information, questioning the reliability of data and therefore confusion the decision-making procedures, financial burden, increased staff workload, influence on public opinion, social unrest and possibly natural disasters and human casualties. Cyberspace constitutes the fifth dimension of confrontations with the difference that it provides the right conditions for conducting a covert war, in which there is a possibility that neither side recognizes that takes part in conflict or even that it has been attacked, but even if it does recognize this, it is very difficult or even impossible to clear identify the opponent, the area and the way he operates. In particular, for military activity in the era of the "Information Revolution", cyberspace is considered a new field, where various belligerent forces seek to prevail over their adversaries. However, dominance in cyberspace is a complex issue, as it is not equivalent to the dominance of a single material space (such as space or ground) subject to the laws of nature, but instead it is about securing an advantageous position in a complex human construction, which can be repeated and whose function is based on the coordinated action of material elements, artificial rules and real data. The generalized perception that Cyberspace is one and only, but also treating the two terms (Cyberspace and Internet) as identical, without their interchange implying any conceptual differentiation is a fallacy, as each individual electronic system-network has the ability to creates its own cyberspace, within which the right of access and the very existence of a user-actor should be recognized, so that his actions acquire meaning and interact with the actions of others. Therefore, in the context of a
  • 3. Cyberspace-New Operational field of confrontations Papadakis Konstantinos, Cyber- Information Warfare Analyst & Cyber Defense/Security Consultant conflict, it is crucial to ensure the sovereignty of the cyberspace in which each faction's military target is located. Cyberspace as an operational environment has several unique features: 1. It does not obey in space-time limitations since an action in or through it can be performed in a short time (seconds), from significantly long distances (global coverage) without requiring proximity to the opponent, and in most cases without early warning. 2. Attribution for an aggressive action is extremely difficult , since the perpetrators could act in disguise, hiding their real identity and goals. 3. The cost of developing cyber capabilities as well as conducting cyber operations in this field is much lower, compared to the cost of conventional operations. 4. It contains constantly dynamically configured, huge amounts of high and/or classified information of high value, in structured or unstructured form which are mainly transmitted through commercial networks and without following the same path from the issuer to the recipient, or the same safety standards. 5. It has created global conditions of dependence from it (according to information technology degree of penetration in each state) to all forms of human activity, since within or through it, daily actions take place that serve the total of economic, business, communication, social, state, military activities of citizens and states. In order for respective groups to understand and analyze the unique operational environment, cyberspace and cyber operations are inextricably linked with the use of eight interrelated operational variables (political, economic, social, military, informational, infrastructure, physical environment, time). Under these circumstances and taking into account the phenomenal rate of diffusion, evolution and penetration of information and communication technologies, combined with the ever-increasing addition of critical infrastructure in this field, states should: 1. Address cyber operations in terms of an "Asymmetric Threat" and as "Force Multiplier" since the increasing state dependence on information and communication technologies combined with the low cost of developing cyber-capabilities and the severity of the damage which may cause, reducing them to a unique solution that many adversaries can exploit in order to maintain the balance or gain some advantage in terms of military power over an adversary. 2. Develop and use appropriate defense capabilities (cyber defense) in cyberspace in order to protect national critical infrastructures. 3. Operate against a wide range of actors (Nation-states, state-sponsored actors, non-state actors, legitimate enterprises, criminal organizations, and individuals, etc.), with different levels of education, training, skills, motivations and abilities, which is a significant change in traditional geopolitical and military perceptions of enemy and
  • 4. Cyberspace-New Operational field of confrontations Papadakis Konstantinos, Cyber- Information Warfare Analyst & Cyber Defense/Security Consultant threat of a specific orientation (geographical, ideological, etc.) and requires a new perspective in terms of operations as well as a different type of training. 4. Develop on a daily basis effective relationships and collaborations with all actors (public, private, academic institutes, military forces) involved in the field of cyberspace since this field is created, owned, maintained and operated by public, private, and government agencies around the world, with the result that research, and development carried out by these agencies will largely be the catalyst for changes in cyberspace operations. New trends want the field of cyberspace to be considered as a subset of the wider information environment which also includes other fields such as the electromagnetic spectrum, space, etc., and correspondingly cyberspace operations integrated into information operations to achieve their maximum potential.