Key terrain in cyberspace: Seeking the high ground

David Raymond, Tom Cross, Gregory Conti, Michael E. Nowatkowski

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Citations (Scopus)

Abstract

In military doctrine, key terrain refers to areas which, if seized, afford an advantage to an attacker or defender. When applied to geographic terrain, this definition is clear. Key terrain might include a hill that overlooks a valley an enemy wants to control or a crossing point over a river that must be traversed before launching an attack. By definition, dominance of key terrain is likely to decide the overall outcome of a battle. While cyber key terrain is similar to geographic key terrain in some ways, there are also significant and often counterintuitive differences. Some consider cyber terrain to be tied to a physical location and to be represented in cyberspace by routers, switches, cables, and other devices. We will argue that key terrain in cyberspace exists at all of the cyberspace planes, which include the geographic, physical, logical, cyber persona, and supervisory planes [1]. In many cases, features of cyber terrain will not be tied to a specific location, or the geographic location will be irrelevant. In this paper we deconstruct and analyze cyber key terrain, provide a generalized framework for critical analysis, and draw parallels between cyber and physical key terrain while providing examples of key terrain in cyber operations. During a cyber operation, an analysis of key terrain will aid in the strategy and tactics of both the offense and the defense. During peacetime, an understanding of cyber key terrain can be employed broadly, ranging from helping a system administrator focus scarce resources to defend his network all the way to allowing nation-state militaries to develop long-lasting and effective doctrine.

Original languageEnglish (US)
Title of host publicationInternational Conference on Cyber Conflict, CYCON
EditorsPascal Brangetto, Markus Maybaum, Jan Stinissen
PublisherIEEE Computer Society
Pages287-300
Number of pages14
ISBN (Electronic)9789949954407
DOIs
StatePublished - Oct 3 2014
Event2014 6th International Conference on Cyber Conflict, CYCON 2014 - Tallinn, Estonia
Duration: Jun 3 2014Jun 6 2014

Publication series

NameInternational Conference on Cyber Conflict, CYCON
Volume2014
ISSN (Print)2325-5366
ISSN (Electronic)2325-5374

Other

Other2014 6th International Conference on Cyber Conflict, CYCON 2014
CountryEstonia
CityTallinn
Period6/3/146/6/14

Fingerprint

Launching
Routers
Cables
Rivers
Switches

Keywords

  • cyber operations
  • cyber terrain
  • key terrain
  • terrain analysis

ASJC Scopus subject areas

  • Computer Networks and Communications

Cite this

Raymond, D., Cross, T., Conti, G., & Nowatkowski, M. E. (2014). Key terrain in cyberspace: Seeking the high ground. In P. Brangetto, M. Maybaum, & J. Stinissen (Eds.), International Conference on Cyber Conflict, CYCON (pp. 287-300). [6916409] (International Conference on Cyber Conflict, CYCON; Vol. 2014). IEEE Computer Society. https://doi.org/10.1109/CYCON.2014.6916409

Key terrain in cyberspace : Seeking the high ground. / Raymond, David; Cross, Tom; Conti, Gregory; Nowatkowski, Michael E.

International Conference on Cyber Conflict, CYCON. ed. / Pascal Brangetto; Markus Maybaum; Jan Stinissen. IEEE Computer Society, 2014. p. 287-300 6916409 (International Conference on Cyber Conflict, CYCON; Vol. 2014).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Raymond, D, Cross, T, Conti, G & Nowatkowski, ME 2014, Key terrain in cyberspace: Seeking the high ground. in P Brangetto, M Maybaum & J Stinissen (eds), International Conference on Cyber Conflict, CYCON., 6916409, International Conference on Cyber Conflict, CYCON, vol. 2014, IEEE Computer Society, pp. 287-300, 2014 6th International Conference on Cyber Conflict, CYCON 2014, Tallinn, Estonia, 6/3/14. https://doi.org/10.1109/CYCON.2014.6916409
Raymond D, Cross T, Conti G, Nowatkowski ME. Key terrain in cyberspace: Seeking the high ground. In Brangetto P, Maybaum M, Stinissen J, editors, International Conference on Cyber Conflict, CYCON. IEEE Computer Society. 2014. p. 287-300. 6916409. (International Conference on Cyber Conflict, CYCON). https://doi.org/10.1109/CYCON.2014.6916409
Raymond, David ; Cross, Tom ; Conti, Gregory ; Nowatkowski, Michael E. / Key terrain in cyberspace : Seeking the high ground. International Conference on Cyber Conflict, CYCON. editor / Pascal Brangetto ; Markus Maybaum ; Jan Stinissen. IEEE Computer Society, 2014. pp. 287-300 (International Conference on Cyber Conflict, CYCON).
@inproceedings{ba2cddb79fa04177b031e3164485a316,
title = "Key terrain in cyberspace: Seeking the high ground",
abstract = "In military doctrine, key terrain refers to areas which, if seized, afford an advantage to an attacker or defender. When applied to geographic terrain, this definition is clear. Key terrain might include a hill that overlooks a valley an enemy wants to control or a crossing point over a river that must be traversed before launching an attack. By definition, dominance of key terrain is likely to decide the overall outcome of a battle. While cyber key terrain is similar to geographic key terrain in some ways, there are also significant and often counterintuitive differences. Some consider cyber terrain to be tied to a physical location and to be represented in cyberspace by routers, switches, cables, and other devices. We will argue that key terrain in cyberspace exists at all of the cyberspace planes, which include the geographic, physical, logical, cyber persona, and supervisory planes [1]. In many cases, features of cyber terrain will not be tied to a specific location, or the geographic location will be irrelevant. In this paper we deconstruct and analyze cyber key terrain, provide a generalized framework for critical analysis, and draw parallels between cyber and physical key terrain while providing examples of key terrain in cyber operations. During a cyber operation, an analysis of key terrain will aid in the strategy and tactics of both the offense and the defense. During peacetime, an understanding of cyber key terrain can be employed broadly, ranging from helping a system administrator focus scarce resources to defend his network all the way to allowing nation-state militaries to develop long-lasting and effective doctrine.",
keywords = "cyber operations, cyber terrain, key terrain, terrain analysis",
author = "David Raymond and Tom Cross and Gregory Conti and Nowatkowski, {Michael E.}",
year = "2014",
month = "10",
day = "3",
doi = "10.1109/CYCON.2014.6916409",
language = "English (US)",
series = "International Conference on Cyber Conflict, CYCON",
publisher = "IEEE Computer Society",
pages = "287--300",
editor = "Pascal Brangetto and Markus Maybaum and Jan Stinissen",
booktitle = "International Conference on Cyber Conflict, CYCON",

}

TY - GEN

T1 - Key terrain in cyberspace

T2 - Seeking the high ground

AU - Raymond, David

AU - Cross, Tom

AU - Conti, Gregory

AU - Nowatkowski, Michael E.

PY - 2014/10/3

Y1 - 2014/10/3

N2 - In military doctrine, key terrain refers to areas which, if seized, afford an advantage to an attacker or defender. When applied to geographic terrain, this definition is clear. Key terrain might include a hill that overlooks a valley an enemy wants to control or a crossing point over a river that must be traversed before launching an attack. By definition, dominance of key terrain is likely to decide the overall outcome of a battle. While cyber key terrain is similar to geographic key terrain in some ways, there are also significant and often counterintuitive differences. Some consider cyber terrain to be tied to a physical location and to be represented in cyberspace by routers, switches, cables, and other devices. We will argue that key terrain in cyberspace exists at all of the cyberspace planes, which include the geographic, physical, logical, cyber persona, and supervisory planes [1]. In many cases, features of cyber terrain will not be tied to a specific location, or the geographic location will be irrelevant. In this paper we deconstruct and analyze cyber key terrain, provide a generalized framework for critical analysis, and draw parallels between cyber and physical key terrain while providing examples of key terrain in cyber operations. During a cyber operation, an analysis of key terrain will aid in the strategy and tactics of both the offense and the defense. During peacetime, an understanding of cyber key terrain can be employed broadly, ranging from helping a system administrator focus scarce resources to defend his network all the way to allowing nation-state militaries to develop long-lasting and effective doctrine.

AB - In military doctrine, key terrain refers to areas which, if seized, afford an advantage to an attacker or defender. When applied to geographic terrain, this definition is clear. Key terrain might include a hill that overlooks a valley an enemy wants to control or a crossing point over a river that must be traversed before launching an attack. By definition, dominance of key terrain is likely to decide the overall outcome of a battle. While cyber key terrain is similar to geographic key terrain in some ways, there are also significant and often counterintuitive differences. Some consider cyber terrain to be tied to a physical location and to be represented in cyberspace by routers, switches, cables, and other devices. We will argue that key terrain in cyberspace exists at all of the cyberspace planes, which include the geographic, physical, logical, cyber persona, and supervisory planes [1]. In many cases, features of cyber terrain will not be tied to a specific location, or the geographic location will be irrelevant. In this paper we deconstruct and analyze cyber key terrain, provide a generalized framework for critical analysis, and draw parallels between cyber and physical key terrain while providing examples of key terrain in cyber operations. During a cyber operation, an analysis of key terrain will aid in the strategy and tactics of both the offense and the defense. During peacetime, an understanding of cyber key terrain can be employed broadly, ranging from helping a system administrator focus scarce resources to defend his network all the way to allowing nation-state militaries to develop long-lasting and effective doctrine.

KW - cyber operations

KW - cyber terrain

KW - key terrain

KW - terrain analysis

UR - http://www.scopus.com/inward/record.url?scp=84907930310&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84907930310&partnerID=8YFLogxK

U2 - 10.1109/CYCON.2014.6916409

DO - 10.1109/CYCON.2014.6916409

M3 - Conference contribution

AN - SCOPUS:84907930310

T3 - International Conference on Cyber Conflict, CYCON

SP - 287

EP - 300

BT - International Conference on Cyber Conflict, CYCON

A2 - Brangetto, Pascal

A2 - Maybaum, Markus

A2 - Stinissen, Jan

PB - IEEE Computer Society

ER -