Cyber Warfare and the Future Development of Cyber Operations
Main Article Content
Abstract
Cyberspace is a virtual domain that has increasingly been utilized for security and military purposes. This trend is evident in the development, enhancement, and demonstration of cyber capabilities by various states, which have become particularly prominent over the past two decades. Nevertheless, knowledge and understanding of fundamental principles and cyber operational doctrines remain limited. This may result in the formulation and implementation of strategies and policies that are not fully aligned with the rapidly and continuously evolving security environment of cyberspace. Therefore, this article presents the fundamental principles related to cyber operations and examines several significant cyber operations in order to illustrate the relationship between cyber defense and the protection of resources and critical infrastructure of the Royal Thai Navy, ensuring preparedness against potential cyber threats in the future.
Downloads
Article Details

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Articles in this journal are copyrighted by the Naval Strategic Studies Center, Naval Education Department, and published under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International (CC BY-NC-ND 4.0) license.
may be read and used for academic purposes, such as teaching, research, or citation, with proper credit given to the author and the journal.
Use or modification of the articles is prohibited without permission.
Statements expressed in the articles are solely the opinions of the authors.
Authors are fully responsible for the content and accuracy of their articles.
Any other republication of the articles requires permission from the journal.
References
Andress J., Winterfeld S. (2013), Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners: Second Edition., Waltham, MA 02451, USA, ISBN 978-0-12-416672-1
D. Cenciotti (2009), French Navy Rafales grounded by a computer virus, The Aviationist, Available at https://theaviationist.com/2009/02/13/french-navy-rafales-grounded-bya-computer-virus/
Darko G., Darko M., Boris G. (2017) Cybersecurity and cyber defence: national level strategic approach, Automatika, 58:3, pp. 273-286
Elliott C.. (2010), Botnets: To what extent are they a threat to information security? Information Security Technical Report, 15 (3), pp.79–103.
Koch R., Golling M. (2018), The cyber decade: Cyber defence at a X-ing point. 10th International Conference on Cyber Conflict (CyCon), 2018-May, pp.159–186.
Kshetri, N. (2014). Cyberwarfare in the Korean Peninsula: Asymmetries and Strategic Responses. East Asia, 31(3), pp.183–201.
Marks P. (2011), Air traffic system vulnerable to cyber-attack, New Scientist. Vol. 211 No. 2829, pp. 22-23.
Nichols R. K., Mumm H. C., Lonstein W., Ryan D, Julie J. C.H., Carter C. (2018), Unmanned Aircraft Systems (UAS) in the Cyber Domain: Protecting USA's Advanced Air Assets, NPP Book
Robinson M., Jones K.. Janicke, H. (2015), Cyber warfare: Issues and challenges, Computers & Security, 49, pp.70–94.
S. Adee. (2008), The hunt for the kill switch, IEEE Spectrum, Vol.45 No.5, pp.34-39.
Shin, J., Son, H., Khalil ur, R., Heo, G. (2015). Development of a cyber-security risk model using Bayesian networks. Reliability Engineering & System Safety, 134, pp.208–217.
S. Michael N. (2013), Tallinn Manual on the International Law Applicable to Cyber Warfare. New York, United States of America: Cambridge University Press.
Skorobogatov S. Woods, C. (2012). Breakthrough silicon scanning discovers backdoor in military chip. International Workshop on Cryptographic Hardware and Embedded Systems.
Rod Thornton & Marina Miron (2020) Towards the ‘Third Revolution in Military Affairs’, The RUSI Journal, 165:3, pp. 12-21
Wilailux, K. (2019), The Kinetic Effect of Cyberwar, 연구서, 해군대학, 합동군사대학교, 대한민국.