OODA Loops in Cyberspace: A New Cyber-Defense Model
In this article we combine Colonel John Boyd’s Observe/Orient/Decide/Act Loop with the NSA Methodology for Adversary Obstruction to create a new cyber‑defense model.
In this article we combine Colonel John Boyd’s Observe/Orient/Decide/Act Loop with the NSA Methodology for Adversary Obstruction to create a new cyber‑defense model.
This paper explores the complexity surrounding the Syrian Civil War, current legislation that exists regarding cyber-warfare and ethics of cyber-attacks.