Achieve Cyber Dominance: The Six Critical Controls

Achieve Cyber Dominance: The Six Critical Controls

Cyber Dominance, Cyber Dominance Theory
Want to achieve Dominance in the Cyber Domain? Learn to control yourself and your opponent with the Six Critical Controls of Cyber Dominance Theory. Dominance: It's About Control. Why do we fight in the Cyber Domain? Cyber Dominance Theory answers: so that you can get what you want, when you want it. You want secure data? Done. You want a website with no downtime? You got it. You want Cyber Dominance. The daily struggle to achieve Cyber Dominance is Cyber Warfare. Whether or not you wanted to join the fight, you are a part of it. So prepare to defend yourself - or prepare to be a casualty of the war. Every battle of the Cyber War is about one thing: control. He who has control gets what he wants,…
Read More
General Dominance Theory, SECOND EDITION Released

General Dominance Theory, SECOND EDITION Released

Cyber Dominance Theory, Dominance, General Dominance Theory
The latest update to General Dominance Theory was released last week.  This is the first major update since the original work was published in 2014, and includes improvements to terminology and introduces the concept of the Desired End State Space, a tool to help cyber warfighters focus time and money on goals that will lead to success in the cyber domain. (more…)
Read More
Defend Against Distributed Denial of Service Attacks – Watch A Grocery Store

Defend Against Distributed Denial of Service Attacks – Watch A Grocery Store

Cyber, Cyber Creativity
How can you defend your service from a distributed denial of service attack?  The Answer is at the grocery store.  Distribute your service to force your adversary to divide his forces or be ineffective. The Challenge of Distributed Denial of Service Attacks A Distributed Denial of Service attack (DDoS) aims to flood a computer providing a service (e.g. a web server) with so many requests from so many different sources that your server is overloaded and service is either degraded (i.e. very slow) or denied (by crashing the server).  This is similar to a website running slowly when it is being used a lot by legitimate users, except that the degradation is deliberate and intends to deny legitimate users access to the service temporarily or permenantly. (more…)
Read More
CyberDominance.com is the Home of Cyber Dominance Theory

CyberDominance.com is the Home of Cyber Dominance Theory

Cyber Dominance, Cyber Dominance Theory
CyberDominance.com is the home of Cyber Dominance Theory (CDT). Cyber Dominance Theory is an application of General Dominance Theory.  It provides guidelines for how to achieve dominance in the Cyber Domain.  All developments in CDT will be published and discussed on CyberDominance.com. Introduction to Cyber Dominance Theory Cyber Dominance Theory is the guide to achieving Cyber Dominance.  At the core, it combination of two concepts: General Dominance Theory, and Cyber Security Fundamentals. General Dominance Theory. GDT, originally developed for Navy Information warfare, is a guide for achieving dominance in any domain. Cyber Security Fundamentals. The topical technical knowledge related to computer and network security, and the behavior of the people who use them. General Dominance Theory -> Cyber Dominance Theory General Dominance Theory (GDT) can be applied to any domain.  To apply it to the cyber domain, we…
Read More
CyberDominance.com is the New Home of General Dominance Theory

CyberDominance.com is the New Home of General Dominance Theory

Dominance, General Dominance Theory
CyberDominance.com is the new home of General Dominance Theory (GDT). GDT is the basis for Cyber Dominance theory.  It provides guidelines for how to achieve dominance in any domain, including Cyber.  Now all developments in GDT will be published and discussed on CyberDominance.com. Introduction to General Dominance Theory General Dominance Theory (GDT) was originally developed as a proposed way to help the US Navy make sense of the Information Domain, and to provide a roadmap on how dominance in the Information Domain (i.e. Information Dominance) could be achieved, and how warfighters could weaponized information.  GDT does not just describe the concept of dominance in the context of military warfare, but also any case where a person or group struggles to achieve their desires.  Business, politics, camping, learning – anything. In war (or any…
Read More
Beat Cyber Hackers: Protect Against Identity Theft by Devaluing Information

Beat Cyber Hackers: Protect Against Identity Theft by Devaluing Information

Cyber, Cyber Creativity
Why must we live in fear of identity theft?  Why must we pay companies to mitigate the effects of identity theft?  Instead, we can beat cyber hackers and protect against identity theft by fundamentally changing the way we use information to authenticate users.  If hackers steal information because it is valuable, then devaluing that information could negate the threat.  In cases like identity theft, this could make some hacks not worth the effort and could have other social benefits because you can actually share your birthdate with your friends. (more…)
Read More