Cyber Warfare and the Future Development of Cyber Operations

Main Article Content

korakoch vilailuck

Abstract

Cyberspace is a virtual domain that has increasingly been utilized for security and military purposes. This trend is evident in the development, enhancement, and demonstration of cyber capabilities by various states, which have become particularly prominent over the past two decades. Nevertheless, knowledge and understanding of fundamental principles and cyber operational doctrines remain limited. This may result in the formulation and implementation of strategies and policies that are not fully aligned with the rapidly and continuously evolving security environment of cyberspace. Therefore, this article presents the fundamental principles related to cyber operations and examines several significant cyber operations in order to illustrate the relationship between cyber defense and the protection of resources and critical infrastructure of the Royal Thai Navy, ensuring preparedness against potential cyber threats in the future.

Downloads

Download data is not yet available.

Article Details

How to Cite
vilailuck, korakoch . (2025). Cyber Warfare and the Future Development of Cyber Operations. Naval Strategic Studies Journal, 45(2), 37–61. retrieved from https://so16.tci-thaijo.org/index.php/nssc_journal/article/view/3194
Section
Academic Article

References

Andress J., Winterfeld S. (2013), Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners: Second Edition., Waltham, MA 02451, USA, ISBN 978-0-12-416672-1

D. Cenciotti (2009), French Navy Rafales grounded by a computer virus, The Aviationist, Available at https://theaviationist.com/2009/02/13/french-navy-rafales-grounded-bya-computer-virus/

Darko G., Darko M., Boris G. (2017) Cybersecurity and cyber defence: national level strategic approach, Automatika, 58:3, pp. 273-286

Elliott C.. (2010), Botnets: To what extent are they a threat to information security? Information Security Technical Report, 15 (3), pp.79–103.

Koch R., Golling M. (2018), The cyber decade: Cyber defence at a X-ing point. 10th International Conference on Cyber Conflict (CyCon), 2018-May, pp.159–186.

Kshetri, N. (2014). Cyberwarfare in the Korean Peninsula: Asymmetries and Strategic Responses. East Asia, 31(3), pp.183–201.

Marks P. (2011), Air traffic system vulnerable to cyber-attack, New Scientist. Vol. 211 No. 2829, pp. 22-23.

Nichols R. K., Mumm H. C., Lonstein W., Ryan D, Julie J. C.H., Carter C. (2018), Unmanned Aircraft Systems (UAS) in the Cyber Domain: Protecting USA's Advanced Air Assets, NPP Book

Robinson M., Jones K.. Janicke, H. (2015), Cyber warfare: Issues and challenges, Computers & Security, 49, pp.70–94.

S. Adee. (2008), The hunt for the kill switch, IEEE Spectrum, Vol.45 No.5, pp.34-39.

Shin, J., Son, H., Khalil ur, R., Heo, G. (2015). Development of a cyber-security risk model using Bayesian networks. Reliability Engineering & System Safety, 134, pp.208–217.

S. Michael N. (2013), Tallinn Manual on the International Law Applicable to Cyber Warfare. New York, United States of America: Cambridge University Press.

Skorobogatov S. Woods, C. (2012). Breakthrough silicon scanning discovers backdoor in military chip. International Workshop on Cryptographic Hardware and Embedded Systems.

Rod Thornton & Marina Miron (2020) Towards the ‘Third Revolution in Military Affairs’, The RUSI Journal, 165:3, pp. 12-21

Wilailux, K. (2019), The Kinetic Effect of Cyberwar, 연구서, 해군대학, 합동군사대학교, 대한민국.