CyberDominance.com is the Home of Cyber Dominance Theory

CyberDominance.com is the Home of Cyber Dominance Theory

Cyber Dominance, Cyber Dominance Theory

CyberDominance.com is the home of Cyber Dominance Theory (CDT).

Cyber Dominance Theory is an application of General Dominance Theory.  It provides guidelines for how to achieve dominance in the Cyber Domain.  All developments in CDT will be published and discussed on CyberDominance.com.

Introduction to Cyber Dominance Theory

Cyber Dominance Theory is the guide to achieving Cyber Dominance.  At the core, it combination of two concepts: General Dominance Theory, and Cyber Security Fundamentals.

  1. General Dominance Theory. GDT, originally developed for Navy Information warfare, is a guide for achieving dominance in any domain.
  2. Cyber Security Fundamentals. The topical technical knowledge related to computer and network security, and the behavior of the people who use them.

General Dominance Theory -> Cyber Dominance Theory

General Dominance Theory (GDT) can be applied to any domain.  To apply it to the cyber domain, we will need to do the following:

  1. Define the Cyber Domain and terms of cyber warfare
  2. Define the Six Critical Controls of Cyber Dominance (SCC-C)
  3. Translate the SCCC into a Cyber Warfare Framework

Dominance is what we want in the Cyber Domain, because being dominant means that if we don’t want to be hacked, we won’t get hacked.  If we want to hack, we can.  If we want to communicate, we can.  If we want to deny our adversary’s communications, we can.  Users have the access they need.

GDT defines Dominance as: the state in the battle space where a desired image of reality can be achieved completely despite the will of an adversary.  Therefore, Cyber Dominance is: the state in the Cyber Domain where a desired image of cyber reality can be achieved completely despite the will of an adversary.

The struggle for Cyber Dominance is cyber war, and the actions we take to win the war are all part of Cyber Warfare.  Cyber Warfare is the pursuit of Cyber Dominance.

Perception of Reality (POR) and Ability to Affect Reality (ATA) are required to achieve Dominance, therefore Perception of Reality in the Cyber Domain (POR-C) and Ability to Affect Reality in the Cyber Domain (ATA-C) are required to achieve Cyber Dominance.  Cyber Warfare is also the struggle against an adversary to achieve and retain a perfect ATA-C and POR-C:

According to Cyber Dominance Theory, Cyber Dominance is achieved when you have a perfect Ability to Affect the Cyber Domain (ATA-C) and Perception of the Cyber Domain (POR-C).
According to Cyber Dominance Theory, Cyber Dominance is achieved when you have a perfect Ability to Affect the Cyber Domain (ATA-C) and Perception of the Cyber Domain (POR-C).

Further Reading

The Cyber Dominance Theory page contains a thorough overview of CDT and links to other topics about CDT.  You can also find all CDT publications, tools, and diagrams from that page.

Beat Cyber Hackers: Protect Against Identity Theft by Devaluing Information

Beat Cyber Hackers: Protect Against Identity Theft by Devaluing Information

Cyber, Cyber Creativity

Why must we live in fear of identity theft?  Why must we pay companies to mitigate the effects of identity theft?  Instead, we can beat cyber hackers and protect against identity theft by fundamentally changing the way we use information to authenticate users.  If hackers steal information because it is valuable, then devaluing that information could negate the threat.  In cases like identity theft, this could make some hacks not worth the effort and could have other social benefits because you can actually share your birthdate with your friends.

Continue reading “Beat Cyber Hackers: Protect Against Identity Theft by Devaluing Information”