Deterrence of Cyber Attacks and U.S. National Security

نویسنده

  • Charles L. Glaser
چکیده

This paper draws on deterrence theory to analyze the challenges that the United States faces in deterring cyber attacks. We begin by briefly reviewing the basic logic of deterrence theory and relating it to the challenge posed by cyber attacks. The following section explores what is commonly viewed as the key problem in deterring cyber attacks—the “attribution problem” arises when a state cannot determine who has attacked it and therefore cannot credibly threaten to respond. We suggest that this barrier to deterrence has been exaggerated, while acknowledging that it does create a number of dangers. The following two sections discuss deterrence of different types of cyber attacks—those designed to damage the U.S. economy and society, and those designed to weaken U.S. conventional military forces. The final section highlights a few points, including the need for the United States to design a clear declaratory policy that explains its cyber deterrence strategy and the importance of integrating deterrence into a multilayer policy designed to protect the United States from cyber attacks. Work supported by the Office of the Vice President for Academic Affairs and the School of Engineering and Applied Science of the George Washington University

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Review on Cyberspace Security: Lessons for Islamic Republic of Iran

Today governments face a threat by cyber attacks capable of disrupting communicative, economic and vital services that cause severe damages and losses. It has been years that Islamic republic of Iran benefits from cyberspace in different military and civilian sectors. Sensitive national centers such as nuclear facilities and Ministry of Oil have been targeted by individuals, groups and governme...

متن کامل

Challenges for Securing Cyber Physical Systems

We discuss three key challenges for securing cyberphysical systems: (1) understanding the threats, and possible consequences of attacks, (2) identifying the unique properties of cyber-physical systems and their differences from traditional IT security, and (3) discussing security mechanisms applicable to cyber-physical systems. In particular, we analyze security mechanisms for: prevention, dete...

متن کامل

Alternatives to Cyber Warfare: Deterrence and Assurance

Deterrence as practiced during the Cold War was largely defined in terms of capabilities to impose punishment in response to an attack; however, with growing concern over the proliferation of cyber technologies, deterrence has evolved to be understood more generally in terms of cost/benefit calculi, viewed from not only a national perspective, but also recognizing the importance of both friendl...

متن کامل

Strategic Operations in the Cyber Domain and their Implications for National Cyber Security

With the public discussion mainly revolving around deterrence (either by denial or by punishment), there are actually a number of strategies which can be applied to cyber operations. A cyber strategy can be thought of as an umbrella for various individual cyber operations with the ultimate aim to achieve a strategic and / or political goal. Thus, cyber strategies can be defined as the developme...

متن کامل

The United States National Security Strategy under Bush and Obama: Continuity and Change

The foreign policy of states determines the way they behave in the international arena. Accurate analysis of official foreign policy documents of a country is helpful in that it shows what the international priorities of a country are at specific periods. This article reviews the U.S. National Security Strategy documents published in 2002, 2006, 2010 and 2015 from the perspective of the percept...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011