Deterrence of Cyber Attacks and U.S. National Security
نویسنده
چکیده
This paper draws on deterrence theory to analyze the challenges that the United States faces in deterring cyber attacks. We begin by briefly reviewing the basic logic of deterrence theory and relating it to the challenge posed by cyber attacks. The following section explores what is commonly viewed as the key problem in deterring cyber attacks—the “attribution problem” arises when a state cannot determine who has attacked it and therefore cannot credibly threaten to respond. We suggest that this barrier to deterrence has been exaggerated, while acknowledging that it does create a number of dangers. The following two sections discuss deterrence of different types of cyber attacks—those designed to damage the U.S. economy and society, and those designed to weaken U.S. conventional military forces. The final section highlights a few points, including the need for the United States to design a clear declaratory policy that explains its cyber deterrence strategy and the importance of integrating deterrence into a multilayer policy designed to protect the United States from cyber attacks. Work supported by the Office of the Vice President for Academic Affairs and the School of Engineering and Applied Science of the George Washington University
منابع مشابه
A Review on Cyberspace Security: Lessons for Islamic Republic of Iran
Today governments face a threat by cyber attacks capable of disrupting communicative, economic and vital services that cause severe damages and losses. It has been years that Islamic republic of Iran benefits from cyberspace in different military and civilian sectors. Sensitive national centers such as nuclear facilities and Ministry of Oil have been targeted by individuals, groups and governme...
متن کاملChallenges for Securing Cyber Physical Systems
We discuss three key challenges for securing cyberphysical systems: (1) understanding the threats, and possible consequences of attacks, (2) identifying the unique properties of cyber-physical systems and their differences from traditional IT security, and (3) discussing security mechanisms applicable to cyber-physical systems. In particular, we analyze security mechanisms for: prevention, dete...
متن کاملAlternatives to Cyber Warfare: Deterrence and Assurance
Deterrence as practiced during the Cold War was largely defined in terms of capabilities to impose punishment in response to an attack; however, with growing concern over the proliferation of cyber technologies, deterrence has evolved to be understood more generally in terms of cost/benefit calculi, viewed from not only a national perspective, but also recognizing the importance of both friendl...
متن کاملStrategic Operations in the Cyber Domain and their Implications for National Cyber Security
With the public discussion mainly revolving around deterrence (either by denial or by punishment), there are actually a number of strategies which can be applied to cyber operations. A cyber strategy can be thought of as an umbrella for various individual cyber operations with the ultimate aim to achieve a strategic and / or political goal. Thus, cyber strategies can be defined as the developme...
متن کاملThe United States National Security Strategy under Bush and Obama: Continuity and Change
The foreign policy of states determines the way they behave in the international arena. Accurate analysis of official foreign policy documents of a country is helpful in that it shows what the international priorities of a country are at specific periods. This article reviews the U.S. National Security Strategy documents published in 2002, 2006, 2010 and 2015 from the perspective of the percept...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2011