STRATEGIC MANAGEMENT Edited by Dr

Total Page:16

File Type:pdf, Size:1020Kb

STRATEGIC MANAGEMENT Edited by Dr /DCOM506 Edited by: Dr. Anand Thakur STRATEGIC MANAGEMENT Edited By Dr. Anand Thakur Printed by EXCEL BOOKS PRIVATE LIMITED A-45, Naraina, Phase-I, New Delhi-110028 for Lovely Professional University Phagwara SYLLABUS Objectives: Development and reinforcement of a general management point of view-the capacity to view the firm from an overall perspective, in the context of its environment. Development of an understanding of fundamental concepts in strategic management: the role of the general manager, the levels and components of strategy, competitive analysis, and organizational evolution. Development of those skills and knowledge peculiar to general management and the general manager's job that have not been covered in previous functional courses. Synthesis of the knowledge gained in previous courses and understand- ing what part of that knowledge is useful to general managers. DCOM506 Strategic Management Sr. No. Description 1. Nature of Strategic Management, Dimensions, benefits and risks. The strategic management process. 2. Strategy formulation. Business vision and mission, Importance, Characteristics and components. Evaluating mission statements. 3. The External Assessment, Porters five force analysis. Industry and competitive analysis. The Global Environment, competitive strategies for firms in global markets. 4. The Internal Assessment: SWOT Analysis, strategy and culture. Value Chain Analysis. Resource based view of the firm. Benchmarking. 5. Strategies in Action: The balanced scorecard, types of strategies, Integrative, Intensive, Diversification strategies, defensive strategies, Porters Generic Strategies. 6. Strategy analysis and choice: Business level strategies. Cost leadership, Differentiation, Speed and market focus. Multi business strategy: BCG matrix, GE Nine Cell matrix. Limitations of portfolio approaches. The Parenting framework. 7. Strategy Implementation: Short term objectives, functional tactics. Empowering Operating personnel, Allocation of recourses, managing resource conflict. 8. Structure and strategy: Improving effectiveness of traditional organisational structures. Creating Agile Virtual Organisations, Modular organisation. Towards boundary less structures. 9. Leadership and culture: Strategic intent, Shaping organisational culture. Role of leader in organisational culture. 10. Strategy evaluation: Strategy evaluation process. DMGT502 Strategic Management Sr. No. Description 1 Nature of Strategic Management: Dimensions, benefits and risks, the strategic management process. Establishment of Strategic Intent: Business vision and mission, importance, characteristics and Components, evaluating mission statement, concept of goals and objectives. 2 The Environment Appraisal: External assessment, concept of environment, porters five force analysis, industry and competitive analysis, environmental scanning. 3 Organizational Appraisal: the Internal Assessment: SWOT analysis, strategy and culture, value chain analysis, organizational capability factors, Benchmarking. 4 Corporate Level Strategies: Concentration, integration, diversification, expansion strategies, retrenchment and combination strategies, internationalization, cooperation and restructuring. 5 Business Level Strategies: Industry structure, positioning of firm, generic strategies, business tactics, Internationalization. 6 Strategy Analysis and Choice: Process for strategic choice, strategic analysis, SWOT, industry analysis, corporate portfolio analysis, contingency strategies. 7 Strategic Implementation: Activating strategies, nature, barrier and model for strategy implementation, resource allocation. 8 Structural Implementation: Types of organizational structures, organizational design and change, structures for strategies. Behavioural Implementation: stakeholders and strategy, stakeholder’s management, strategic leadership, corporate culture and strategic management, personal values and ethics, social responsibility and strategic management. 9 Functional and Operational Implementation: Functional strategies, functional plans and policies, operational plans and policies, personnel plans and strategies. 10 Strategic Evaluation and Control: Nature of strategic evaluation and control, strategic control, operational control, techniques for strategic control, role of organizational systems in evaluation. CONTENT Unit 1: Introduction to Strategic Management 1 Ginni Nijhawan, Lovely Professional University Unit 2: Strategy Formulation and Defining Vision 16 Hitesh Jhanji, Lovely Professional University Unit 3: Defining Mission, Goals and Objectives 32 Ginni Nijhawan, Lovely Professional University Unit 4: External Assessment 48 Hitesh Jhanji, Lovely Professional University Unit 5: Organisational Appraisal: The Internal Assessment 76 Hitesh Jhanji, Lovely Professional University Unit 6: Organisational Appraisal: Internal Assessment 91 Hitesh Jhanji, Lovely Professional University Unit 7: Corporate Level Strategies 111 Hitesh Jhanji, Lovely Professional University Unit 8; Business Level Strategies 139 Pavitar Parkash Singh, Lovely Professional University Unit 9: Strategic Analysis and Choice 157 Pavitar Parkash Singh, Lovely Professional University Unit 10: Strategy Implementation 182 Pavitar Parkash Singh, Lovely Professional Universityy Unit 11: Structural Implementation 199 Pavitar Parkash Singh, Lovely Professional University Unit 12: Behavioural Implementation 217 Anand Thakur, Lovely Professional University Unit 13: Functional and Operational Implementation 236 Anand Thakur, Lovely Professional University Unit 14: Strategic Evaluation and Control 251 Anand Thakur, Lovely Professional University Ginni Nijhawan, Lovely Professional University Unit 1: Introduction to Strategic Management Unit 1: Introduction to Strategic Management Notes CONTENTS Objectives Introduction 1.1 Definition of Strategic Management 1.2 Nature of Strategic Management 1.3 Dimensions of Strategic Management 1.4 Need for Strategic Management 1.5 Benefits of Strategic Management 1.6 Risks involved in Strategic Management 1.7 Strategic Management Process 1.8 Summary 1.9 Keywords 1.10 Self Assessment 1.11 Review Questions 1.12 Further Readings Objectives After studying this unit, you will be able to: State the meaning, nature and importance of strategic management Explain the dimensions and benefits of strategic management Identify the risks involved in strategic management Discuss the strategic management process Introduction Strategic Management is exciting and challenging. It makes fundamental decisions about the future direction of a firm – its purpose, its resources and how it interacts with the environment in which it operates. Every aspect of the organisation plays a role in strategy – its people, its finances, its production methods, its customers and so on. Strategic Management can be described as the identification of the purpose of the organisation and the plans and actions to achieve that purpose. It is that set of managerial decisions and actions that determine the long-term performance of a business enterprise. It involves formulating and implementing strategies that will help in aligning the organisation and its environment to achieve organisational goals. Strategic management does not replace the traditional management LOVELY PROFESSIONAL UNIVERSITY 1 Strategic Management Notes activities such as planning, organising, leading or controlling. Rather, it integrates them into a broader context taking into account the external environment and internal capabilities and the organisation’s overall purpose and direction. Thus, strategic management involves those management processes in organisations through which future impact of change is determined and current decisions are taken to reach a desired future. In short, strategic management is about envisioning the future and realizing it. 1.1 Definition of Strategic Management We have so far discussed the concepts of strategic thinking, strategic decision-making and strategic approach which, it is hoped, will serve as an a background understand the nature of strategic management. However, to get an understanding of what goes on in strategic management, it is useful to begin with definitions of strategic management. Later in the unit, we introduce the elements and the process of strategic management and the importance, benefits and limitations of strategic management. As already mentioned, the concepts in strategic management have been developed by a number of authors like Alfred Chandler, Kenneth Andrews, Igor Ansoff, William Glueck, Henry Mintzberg, Michael E. Porter, Peter Drucker and a host of others. There are therefore several definitions of strategic management. Some of the important definitions are: 1. “Strategic management is concerned with the determination of the basic long-term goals and the objectives of an enterprise, and the adoption of courses of action and allocation of resources necessary for carrying out these goals”. – Alfred Chandler, 1962 2. “Strategic management is a stream of decisions and actions which lead to the development of an effective strategy or strategies to help achieve corporate objectives”. – Glueck and Jauch, 1984 3. “Strategic management is a process of formulating, implementing and evaluating cross-functional decisions that enable an organisation to achieve its objective”. – Fed R David, 1997 4. “Strategic management is the set of decisions and actions resulting in the formulation and implementation of plans designed to achieve a company’s objectives.” – Pearce and Robinson,
Recommended publications
  • Attribution and Response to Cybercrime/Terrorism/Warfare Susan W
    Journal of Criminal Law and Criminology Volume 97 Article 2 Issue 2 Winter Winter 2007 At Light Speed: Attribution and Response to Cybercrime/Terrorism/Warfare Susan W. Brenner Follow this and additional works at: https://scholarlycommons.law.northwestern.edu/jclc Part of the Criminal Law Commons, Criminology Commons, and the Criminology and Criminal Justice Commons Recommended Citation Susan W. Brenner, At Light Speed: Attribution and Response to Cybercrime/Terrorism/Warfare, 97 J. Crim. L. & Criminology 379 (2006-2007) This Symposium is brought to you for free and open access by Northwestern University School of Law Scholarly Commons. It has been accepted for inclusion in Journal of Criminal Law and Criminology by an authorized editor of Northwestern University School of Law Scholarly Commons. 0091-4169/07/9702-0379 THE JOURNALOF CRIMINAL LAW & CRIMINOLOGY Vol. 97. No. 2 Copyright 0 2007 by NorthwesternUniversity. Schoolof Low Printedin U.S.A. "AT LIGHT SPEED": ATTRIBUTION AND RESPONSE TO CYBERCRIME/TERRORISM/WARFARE SUSAN W. BRENNER* This Article explains why and how computer technology complicates the related processes of identifying internal (crime and terrorism) and external (war) threats to social order of respondingto those threats. First, it divides the process-attribution-intotwo categories: what-attribution (what kind of attack is this?) and who-attribution (who is responsiblefor this attack?). Then, it analyzes, in detail, how and why our adversaries' use of computer technology blurs the distinctions between what is now cybercrime, cyberterrorism, and cyberwarfare. The Article goes on to analyze how and why computer technology and the blurring of these distinctions erode our ability to mount an effective response to threats of either type.
    [Show full text]
  • Integrated Helicopter Survivability
    Cranfield University Nicholas G. Law Integrated Helicopter Survivability Aeromechanical Systems Group Cranfield Defence and Security PhD DSTL/PUB36228 Cranfield University Cranfield Defence and Security Aeromechanical Systems Group PhD 2011 Nicholas G. Law Integrated Helicopter Survivability Supervisor: Prof. Kevin Knowles May 2011 © Crown copyright 2011. Published with the permission of the Defence Science and Technology Laboratory on behalf of the Controller of HMSO. DISCLAIMER Any views expressed are those of the author and do not necessarily represent those of Dstl, MOD or any other UK government department. ABSTRACT A high level of survivability is important to protect military personnel and equipment and is central to UK defence policy. Integrated Survivability is the systems engineering methodology to achieve optimum survivability at an affordable cost, enabling a mission to be completed successfully in the face of a hostile environment. “Integrated Helicopter Survivability” is an emerging discipline that is applying this systems engineering approach within the helicopter domain. Philosophically the overall survivability objective is ‘zero attrition’, even though this is unobtainable in practice. The research question was: “How can helicopter survivability be assessed in an integrated way so that the best possible level of survivability can be achieved within the constraints and how will the associated methods support the acquisition process?” The research found that principles from safety management could be applied to the survivability problem, in particular reducing survivability risk to as low as reasonably practicable (ALARP). A survivability assessment process was developed to support this approach and was linked into the military helicopter life cycle. This process positioned the survivability assessment methods and associated input data derivation activities.
    [Show full text]
  • National Drug Threat Assessment 2004: Threat Matrix
    National Drug Threat Assessment 2004: Threat Matrix Seized Primary Markets Wholesale Retail Source Transit Entry Points Key Illicit Drug en route/within and Principal Price Range Price Range Retailers Projections Locations Countries into U.S. Developments U.S. in 2002 Suppliers in the U.S. in the U.S. Foreign: Colombia, 101,877.8 kg Mexico, Central SWB states (Texas, Atlanta: Mexican, Dominican $10,000-$38,000 per kg $20-$200 per gram African American and DEA Cocaine Signature Potential worldwide cocaine Peru, Bolivia (352,000 kg reportedly American countries, California, Arizona, Chicago: Mexican, Colombian, (powder) (powder) Hispanic criminal groups Program data indicate production will likely decrease Domestic: None available to U.S. markets) Caribbean island nations New Mexico), Dominican $5-$100 per rock (crack) and street gangs; that average wholesale slightly due to increases in Miami/S Florida, Houston: Mexican, Colombian Caucasian local cocaine purity may be eradication and coca spray New York Los Angeles: Mexican, independent dealers; increasing after previous operations as well as a Cocaine Colombian Dominican, Haitian, decreases each year resumption of the Airbridge Miami: Colombian Jamaican, Mexican, between 1999 and 2002. Denial Program. This may New York: Colombian, Mexican, Native American, and result in a decrease in Dominican (also Jamaican, Puerto Rican criminal cocaine availability in the Puerto Rican, and Traditional groups United States. Organized Crime groups) Foreign: Mexico and, 2,512.6 kg Mexican: Direct from
    [Show full text]
  • Report of the Working Group on Marine Mammal Ecology (WGMME)
    ICES WGMME REPORT 2015 ICES ADVISORY COMMITTEE ICES CM 2015/ACOM:25 Report of the Working Group on Marine Mammal Ecology (WGMME) 9–12 February 2015 London, UK International Council for the Exploration of the Sea Conseil International pour l’Exploration de la Mer H. C. Andersens Boulevard 44–46 DK-1553 Copenhagen V Denmark Telephone (+45) 33 38 67 00 Telefax (+45) 33 93 42 15 www.ices.dk [email protected] Recommended format for purposes of citation: ICES. 2015. Report of the Working Group on Marine Mammal Ecology (WGMME), 9– 12 February 2015, London, UK. ICES CM 2015/ACOM:25. 114 pp. For permission to reproduce material from this publication, please apply to the Gen- eral Secretary. The document is a report of an Expert Group under the auspices of the International Council for the Exploration of the Sea and does not necessarily represent the views of the Council. © 2015 International Council for the Exploration of the Sea ICES WGMME REPORT 2015 | i Contents Executive summary ................................................................................................................ 1 1 Introduction .................................................................................................................... 3 2 Terms of Reference 2015 ............................................................................................... 4 3 ToR a: Review and report on any new information on population abundance, population/stock structure and management frameworks for marine mammals ....................................................................................................
    [Show full text]
  • Terrorism in Afghanistan: a Joint Threat Assessment
    Terrorism in Afghanistan: A Joint Threat Assessment Terrorism in Afghanistan: A Joint Threat Assessment Introduction 7 Chapter I: Afghanistan’s Security Situation and Peace Process: Comparing U.S. and Russian Perspectives (Barnett R. Rubin) 9 Chapter II: Militant Terrorist Groups in, and Connected to, Afghanistan (Ekaterina Stepanova and Javid Ahmad) 24 Chapter III: Afghanistan in the Regional Security Interplay Context (Andrey Kazantsev and Thomas F. Lynch III) 41 Major Findings and Conclusions 67 Appendix A: Protecting Afghanistan’s Borders: U.S. and Russia to Lead in a Regional Counterterrorism Effort (George Gavrilis) 72 Appendix B: Arms Supplies for Afghan Militants and Terrorists (Vadim Kozyulin) 75 Appendix C: Terrorism Financing: Understanding Afghanistan’s Specifics (Konstantin Sorokin and Vladimir Ivanov) 79 Acronyms 83 Terrorism in Afghanistan Joint U.S.-Russia Working Group on Counterterrorism in Afghanistan Working Group Experts: Javid Ahmad1 Senior Fellow, Atlantic Council Sher Jan Ahmadzai Director, Center for Afghanistan Studies, University of Nebraska at Omaha Robert Finn Former Ambassador of the United States to Afghanistan George Gavrilis Fellow, Center for Democracy, Toleration, and Religion, University of California, Berkeley Andrey Kazantsev Director, Center for Central Asian and Afghan Studies, Moscow State Institute of International Relations (MGIMO University) Kirill Koktysh Associate Professor, Moscow State Institute of International Relations (MGIMO University) Member, Expert Council, State Duma Committee of Nationalities Mikhail Konarovsky Former Ambassador of the Russian Federation to Afghanistan Col. (Ret.) Oleg V. Kulakov* Professor of Area Studies, Military University, Ministry of Defence of the Russian Federation Vadim Kozyulin Member, PIR Center Executive Board Researcher, Diplomatic Academy, Ministry of Foreign Affairs of the Russian Federation Thomas F.
    [Show full text]
  • Maritime Security in the Middle East and North Africa: a Strategic Assessment
    MARITIME SECURITY IN THE MIDDLE EAST AND NORTH AFRICA: A STRATEGIC ASSESSMENT By Robert M. Shelala II Research Analyst, Burke Chair in Strategy Anthony H. Cordesman Arleigh A. Burke Chair in Strategy [email protected] Table of Contents Executive Summary ........................................................................................................................ 3 Chapter I – A Brief Introduction to Maritime Security .................................................................. 4 Chapter II – The Suez Canal and the Growing Threat of Egyptian Terrorism ............................... 6 Background on the Canal ............................................................................................................ 6 The Threat of Terrorism .............................................................................................................. 8 Egyptian Maritime Security Capabilities .................................................................................. 13 Recommendations for Securing the Suez Canal ....................................................................... 17 Chapter III – The Gulf and Threats From Iran ............................................................................. 20 A Brief Introduction to the Gulf ................................................................................................ 20 Regional Tensions and Iranian Threats to Gulf Security .......................................................... 22 Escalation Drivers in Iranian Strategic Calculus......................................................................
    [Show full text]
  • Information Security Risk Assessment
    Entry Information Security Risk Assessment Ievgeniia Kuzminykh 1,* , Bogdan Ghita 2 , Volodymyr Sokolov 3 and Taimur Bakhshi 4 1 Department of Informatics, King’s College London, London WC2R 2ND, UK 2 School of Engineering, Computing and Mathematics, University of Plymouth, Plymouth PL4 8AA, UK; [email protected] 3 Department of Information and Cyber Security, Borys Grinchenko Kyiv University, 04212 Kyiv, Ukraine; [email protected] 4 Center for Information Management and Cyber Security, Foundation for Advancement of Science & Technology, Lahore 54770, Pakistan; [email protected] * Correspondence: [email protected] Definition: Information security risk assessment is an important part of enterprises’ management practices that helps to identify, quantify, and prioritize risks against criteria for risk acceptance and objectives relevant to the organization. Risk management refers to a process that consists of identification, management, and elimination or reduction of the likelihood of events that can negatively affect the resources of the information system to reduce security risks that potentially have the ability to affect the information system, subject to an acceptable cost of protection means that contain a risk analysis, analysis of the “cost-effectiveness” parameter, and selection, construction, and testing of the security subsystem, as well as the study of all aspects of security. Keywords: information risk management; security risk assessment; risk classification; OCTAVE; CRAMM; RiskWatch; fuzzy logic Citation: Kuzminykh, I.; Ghita, B.; Sokolov, V.; Bakhshi, T. Information 1. Introduction Security Risk Assessment. Over time, the complexity of information systems is increasing, and, therefore, the Encyclopedia 2021, 1, 602–617. https:// issues of information security are becoming increasingly important for any organization.
    [Show full text]
  • Cyber Security Assessment Netherlands Security Assessment Cyber
    CSAN-4 Cyber Security Assessment Netherlands Cyber Cyber Security Assessment Netherlands CSAN-4 Cyber Security Assessment Netherlands 4CSAN-4 1 2 National Cyber Security Centre The National Cyber Security Centre (NCSC), in collaboration with the business community, government bodies and scientists, is working to increase the ability of Dutch society to defend itself in the digital domain. The NCSC supports the central government and organisations in fulfilling an essential function for society by providing expertise and advice, response to threats and enhancing crisis management. In addition, the NCSC provides information and advice to citizens, the government and the business community relating to awareness and prevention. This means that the NCSC constitutes the central reporting and information point for IT threats and security incidents. The NCSC is part of the Cyber Security Department of the National Coordinator for Security and Counterterrorism [Nationaal Coördinator Terrorismebestrijding en Veiligheid] (NCTV). Collaboration and sources In drawing up this report the NCSC gratefully made use of information provided by the following parties: » The various ministries » MIVD (Military Intelligence and Security Service) » DefCERT (Defence Computer Emergency Response Team) » AIVD (General Intelligence and Security Service) » Team High Tech Crime, Dutch National Police » Public Prosecution Service » Tax and Customs Administration » Members from ISAC (Information Sharing and Analysis Center) » NCTV (National Coordinator for Security and Counterterrorism) » Scientific institutions » Universities » Experts in the field of cyber security Their contributions, the substantive reviews as well as publicly accessible sources, a survey, information from the vital sectors and analyses from the NCSC together, have made valuable contributions to the substantive quality of this assessment.
    [Show full text]
  • SECURING CYBERSPACE a New Domain for National Security
    SECURING CYBERSPACE A New Domain for National Security FOREWORD BY JOSEPH S. NYE & BRENT SCOWCROFT EDITED BY NICHOLAS BURNS & JONATHON PRICE Copyright © 2012 by The Aspen Institute The Aspen Institute One Dupont Circle, N.W. Suite 700 Washington, DC 20036 Published in the United States of America in 2012 by The Aspen Institute All rights reserved Printed in the United States of America ISBN: 0-89843-562-5 Wye Publication Number: 12/001 Cover Design by: Steve Johnson Interior Layout by: Sogand Sepassi aspen strategy group CO-CHAIRMEN Graham Allison Director, Belfer Center Joseph S. Nye, Jr. John F. Kennedy School of Government University Distinguished Service Professor Harvard University John F. Kennedy School of Government Harvard University Zoë Baird Budinger President Brent Scowcroft Markle Foundation President The Scowcroft Group, Inc. Samuel R. Berger Chair Albright Stonebridge Group DIRECTOR Stephen E. Biegun Nicholas Burns Vice President Professor of the Practice of Diplomacy Ford Motor Company and International Politics John F. Kennedy School of Government Robert D. Blackwill Harvard University Henry A. Kissinger Senior Fellow for U.S. Foreign Policy Council on Foreign Relations DEPUTY DIRECTOR Eliot Cohen Jonathon Price Professor Deputy Director Johns Hopkins SAIS Aspen Strategy Group Susan Collins Senator ASSOCIATE DIRECTOR United States Senate Jennifer Jun Richard Cooper Associate Director Professor Aspen Strategy Group Harvard University Richard Danzig Chairman MEMBERS Center for a New American Security Madeleine Albright John Deutch Chair Institute Professor Albright Stonebridge Group Massachusetts Institute of Technology Richard Falkenrath Richard G. Lugar Principal Senator The Chertoff Group United States Senate Peter Feaver Leo Mackay Professor Vice President Duke University Ethics & Business Conduct Lockheed Martin Corporation Dianne Feinstein Senator Jessica T.
    [Show full text]
  • Cyber Threats, Harsh Environment and the European High North (EHN)
    Michigan Technological University Digital Commons @ Michigan Tech Michigan Tech Publications 3-2019 Cyber threats, harsh environment and the European High North (EHN) in a human security and multi-level regulatory global dimension: Which framework applicable to critical infrastructures under “Exceptionally critical infrastructure conditions” (ECIC)? Sandra Cassotta Roman Sidortsov Christer Pursiainen Michael Evan Goodsite Follow this and additional works at: https://digitalcommons.mtu.edu/michigantech-p Part of the Social and Behavioral Sciences Commons Follow this and additional works at: https://digitalcommons.mtu.edu/michigantech-p Part of the Social and Behavioral Sciences Commons Beijing Law Review, 2019, 10, 317-360 http://www.scirp.org/journal/blr ISSN Online: 2159-4635 ISSN Print: 2159-4627 Cyber Threats, Harsh Environment and the European High North (EHN) in a Human Security and Multi-Level Regulatory Global Dimension: Which Framework Applicable to Critical Infrastructures under “Exceptionally Critical Infrastructure Conditions” (ECIC)? Sandra Cassotta1,2,3,4,5,6, Roman Sidortsov7, Christer Pursiainen8, Michael Evan Goodsite9 1Department of Law, Aalborg University, Aalborg, Denmark 2Western Sydney University (WSU), Sydney, Australia 3The Sustainable College Bruges (SCB), Bruges, Belgium 4The Institute for Security and Development Policy (ISDP), Stockholm, Sweden 5The Intergovernmental Panel on Climate Change (IPCC) on Polar Issues and Governance (2017-20), United Nations (UN) 6The International Economic Crime and Cybercrime Research Centre (IEEC) at Aalborg University, Aalborg, Denmark 7Energy Policy Department of Social Sciences, Michigan Technological University, Houghton, Michigan, USA 8Societal Safety and Environment, Department of Engineering and Safety, UiT, The Arctic University of Norway, Tromsø, Norway 9Australian School of Petroleum, School of Civil, Environmental and Mining Engineering, The University of Adelaide, Adelaide, Australia How to cite this paper: Cassotta, S., Si- Abstract dortsov, R., Pursiainen, C., & Goodsite, M.
    [Show full text]
  • Building a Launchpad for Impactful Satellite Cyber-Security Research
    SOK: Building a Launchpad for Impactful Satellite Cyber-Security Research James Pavur Ivan Martinovic Oxford University Oxford University [email protected] [email protected] Abstract—As the space industry approaches a period of rapid astrophysics. Academics in each domain have made valuable change, securing both emerging and legacy satellite missions will discoveries, but contributions in one field are easily overlooked become vital. However, space technology has been largely over- by researchers with a narrow focus on their own. looked by the systems security community. This systematization of knowledge paper seeks to understand why this is the case and This paper offers a cross-disciplinary synthesis of progress to offer a starting point for technical security researchers seeking to date on space systems security. The paper begins by impactful contributions beyond the Earth’s mesosphere. presenting a unified matrix of existing threat models - linking The paper begins with a cross-disciplinary synthesis of relevant attackers, vulnerabilities and motivations drawn from dozens threat models from a diverse array of fields, ranging from legal of prior studies. Underpinning this effort is an exhaustive and policy studies to aerospace engineering. This is presented as a “threat matrix toolbox” which security researchers may historical timeline of satellite hacking incidents, where our leverage to motivate technical research into given attack vectors own archival research is added to prior contributions from Fritz and defenses. We subsequently apply this model to an original and Manulis et al. [1], [2]. The combination of this historical chronology of more than 100 significant satellite hacking incidents analysis and threat modeling framework offers a useful aid spanning the previous 60 years.
    [Show full text]
  • CTC Sentinel 8 (11): the Global Threat from the Islamic State
    v Combating Terrorism Center at West Point Objective • Relevant • Rigorous | November/December 2015 • Volume 8, Issue 11 SPECIAL ISSUE: THE GLOBAL THREAT FROM THE ISLAMIC STATE The Islamic State The Paris Goes Global Attacks Why the group is pivoting toward international The evolving Islamic State threat to France terrorism richard barrett jean-charles brisard FEATURE ARTICLES 1 The Islamic State Goes Global Editor in Chief Paul Cruickshank richard barrett Managing Editor 5 The Paris Attacks and the Evolving Islamic State Threat to France John Watling jean-charles brisard EDITORIAL BOARD INTERVIEW Colonel Cindy R. Jebb, Ph.D. Department Head Dept. of Social Sciences (West Point) 9 A View From the CT Foxhole: An Interview with Zainab N. Ahmad, Assistant U.S. Attorney Colonel Suzanne Nielsen, Ph.D. paul cruickshank Deputy Department Head Dept. of Social Sciences (West Point) ANALYSIS Lieutenant Colonel Bryan Price, Ph.D. Director, CTC 13 A Frontline Report: The Ground War Against the Islamic State Brian Dodwell tim lister Deputy Director, CTC 19 Wilayat Sinai Risks Backlash After Metrojet Bombing CONTACT zack gold Combating Terrorism Center 23 U.S. Military Academy The Islamic State in Southern Syria 607 Cullum Road, Lincoln Hall aaron y. zelin and oula a. alrifai West Point, NY 10996 Phone: (845) 938-8495 Email: [email protected] PROFILE Web: www.ctc.usma.edu/sentinel/ 30 Paris Attack Ringleader Abdelhamid Abaaoud guy van vlierden SUPPORT The Combating Terrorism Center would like to express its gratitude BRIEFINGS to its financial supporters, for without their support and shared vision of the Center products like the 34 San Bernardino and the Islamic State Footprint in America CTC Sentinel could not be produced.
    [Show full text]