HYLAND
measures across existing regional and security alliances such as the GCC
and NATO. Areas for cooperation could include: information sharing to
gain improved situational awareness for network defense; the evolution
of a joint approach to concepts and doctrine; and better incident
management capability and resilience arrangements across security and
regional alliances.
Conclusions
Military use of cyberspace is already a reality and is likely to grow in
importance over the coming decades. Military operations may include
network defense, intelligence gathering, morale operations and cyberattacks.
Attacks will be conducted via malicious software ("cyberweapons),
infiltrating a supply chain or by using people (potentially the greatest
vulnerability as our understanding of human behavior in cyberspace is
still rudimentary).
"High-impact" cyber-weapons of great sophistication have yet to deliver
strategic effect. However, the scale of the proliferation and deployment
of "low-impact," relatively unsophisticated cyber-weapons run the risk of
corroding wider international relations.
e traditional "stove-piped" model of security is no longer effective.
Good IT security is critical, but needs to be incorporated into an holistic
security framework that emphasizes education and effective incident
management.
International action looks unlikely to deliver arms control or regulation
of cyber-weapons in the near future, but regional alliances and similar
partnerships may help improve the effectiveness of cyber-defense. H