Workarounds and a Way Ahead. The challenges addressed make it problematic to add cyber requirements, but not impossible. Ideally, simulation specialists should use computer simulations to create a virtual network that the training audience operates on and presents models for DoS, vulnerability exploitation, virus attacks and a host of other cyber related …show more content…
In this case, there is no cyber simulation system, but the cyber requirements remain. Some methods used by planners include: shutting down internet services for DoS, or adding bogus entries to a command chat room to replicate network penetration. Although not ideal, it forces the training audience to adjust and move to a secondary communication plan. It, however, does not prepare the Cyber Network Defender and Cyber Operations Specialists embedded in the TOC. Additionally, these low fidelity workarounds provide unrealistic results, “and training audiences quickly lose focus and confidence in the value of their training” (Vonthoff, 2017). So, workarounds are short term fixes. For long term, productive solutions, the Army must alter its current mindset on cyber and its