  {"id":45874,"date":"2016-05-13T08:00:03","date_gmt":"2016-05-13T18:00:03","guid":{"rendered":"http:\/\/www.hawaii.edu\/news\/?p=45874"},"modified":"2020-01-16T14:58:03","modified_gmt":"2020-01-17T00:58:03","slug":"a-strategic-perspective-to-planning-for-cyber-attacks","status":"publish","type":"post","link":"https:\/\/www.hawaii.edu\/news\/2016\/05\/13\/a-strategic-perspective-to-planning-for-cyber-attacks\/","title":{"rendered":"A strategic perspective to planning for cyber attacks"},"content":{"rendered":"<span class=\"span-reading-time rt-reading-time\" style=\"display: block;\"><span class=\"rt-label rt-prefix\">Reading time: <\/span> <span class=\"rt-time\"> &lt; 1<\/span> <span class=\"rt-label rt-postfix\">minute<\/span><\/span><figure id=\"attachment_45876\" aria-describedby=\"caption-attachment-45876\" style=\"width: 300px\" class=\"wp-caption alignright\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.hawaii.edu\/news\/wp-content\/uploads\/2016\/05\/west-oahu-chapman-m.jpg\" alt=\"\" width=\"300\" height=\"384\" class=\"size-full wp-image-45876\" srcset=\"https:\/\/www.hawaii.edu\/news\/wp-content\/uploads\/2016\/05\/west-oahu-chapman-m.jpg 300w, https:\/\/www.hawaii.edu\/news\/wp-content\/uploads\/2016\/05\/west-oahu-chapman-m-203x260.jpg 203w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><figcaption id=\"caption-attachment-45876\" class=\"wp-caption-text\">Matthew Chapman<\/figcaption><\/figure>\n<p><a href=\"http:\/\/www.uhwo.hawaii.edu\/\">University of <span aria-label=\"Hawaii\">Âé¶¹´«Ã½<\/span>&#8211;West <span aria-label=\"Oahu\">O&#699;ahu<\/span><\/a> Assistant Professor of <a href=\"http:\/\/www.uhwo.hawaii.edu\/academics\/degrees-and-certificates\/bachelor-of-applied-sciences\/information-technology\/\">Information Technology<\/a> <strong>Matthew Chapman<\/strong> published <a href=\"http:\/\/www.ijert.org\/view-pdf\/14054\/planning-for-malicious-activity-on-communications-networks\">&ldquo;Planning for Malicious Activity on Communication Networks,&rdquo;<\/a> in the <a href=\"http:\/\/www.ijert.org\/\">International Journal of Engineering Research and Technology<\/a>. The article discusses planning for the eventual reality of cyber attacks. <\/p>\n<p>Chapman describes a framework intended to provide a strategic perspective to planning for malicious activity and supplement the growing body of knowledge in information security. Significant phases of this framework include a survey of malicious actors, the cyberspace environment, designing for security, proactive system security and contingency planning.<\/p>\n<h2>More on Matthew Chapman<\/h2>\n<p>Chapman is an experienced computer scientist, serving for more than 24 years as an officer in the <abbr title=\"United States\">U.S.<\/abbr> Army in a variety of positions both nationally and internationally, to include combat and operational deployments in Europe, the Middle East and Asia.<\/p>\n<p>Prior to his retirement in 2014, Chapman served as the chief of cyberspace operations in <abbr>U.S.<\/abbr> Pacific Command and the branch chief for command, control, communications, and cyberspace strategy and architecture.<\/p>\n<p>His awards include the Bronze Star Medal, the Iraq Campaign Medal, the Global War on Terrorism Service Medal and the <abbr>U.S.<\/abbr> Department of State Meritorious Honor Award for accomplishments in Iraq.<\/p>\n<p>Chapman holds bachelor&#8217;s and master&#8217;s degrees in computer science from the College of William and Mary and a <abbr title=\"Doctor of Philosophy\">PhD<\/abbr> in computer science from the <a href=\"http:\/\/manoa.hawaii.edu\/\">University of <span aria-label=\"Hawaii\">Âé¶¹´«Ã½<\/span> at M&#257;noa<\/a>.<\/p>\n<p><em>&#8212;By Julie Funasaki Yuen<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p><abbr title=\"University of Hawaii\">UH<\/abbr> West <span aria-label=\"Oahu\">O&#699;ahu<\/span> Assistant Professor Matthew Chapman&#8217;s paper describes a framework intended to provide a strategic perspective to planning for malicious activity.<\/p>\n","protected":false},"author":16,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[30],"tags":[749,906,416,158,59],"class_list":["post-45874","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-research","tag-cybersecurity","tag-e-kamakani-hou","tag-information-technology","tag-publication","tag-uh-west-oahu","entry","has-media"],"aioseo_notices":[],"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/www.hawaii.edu\/news\/wp-json\/wp\/v2\/posts\/45874","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hawaii.edu\/news\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.hawaii.edu\/news\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.hawaii.edu\/news\/wp-json\/wp\/v2\/users\/16"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hawaii.edu\/news\/wp-json\/wp\/v2\/comments?post=45874"}],"version-history":[{"count":9,"href":"https:\/\/www.hawaii.edu\/news\/wp-json\/wp\/v2\/posts\/45874\/revisions"}],"predecessor-version":[{"id":109532,"href":"https:\/\/www.hawaii.edu\/news\/wp-json\/wp\/v2\/posts\/45874\/revisions\/109532"}],"wp:attachment":[{"href":"https:\/\/www.hawaii.edu\/news\/wp-json\/wp\/v2\/media?parent=45874"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.hawaii.edu\/news\/wp-json\/wp\/v2\/categories?post=45874"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hawaii.edu\/news\/wp-json\/wp\/v2\/tags?post=45874"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}