Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Optimizing Cyber Deterrence

View through CrossRef
Cyber deterrence is not like regular deterrence. In regular deterrence, say between two nuclear powers, the development of more nukes does not make hardened silos less effective on a per unit basis. Cyber deterrence is different. Cyber deterrence is inextricably riddled with tradeoffs and interdependencies that regular deterrence lacks. This chapter outlines the essential tradeoffs between cyber deterrence by denial, punishment, entanglement and taboo. Each case example illustrates how investing heaving in one form of cyber deterrence costs, at margin, in some other category. Cyber deterrence can be optimized, but only with these essential tradeoffs in mind.
Center for Open Science
Title: Optimizing Cyber Deterrence
Description:
Cyber deterrence is not like regular deterrence.
In regular deterrence, say between two nuclear powers, the development of more nukes does not make hardened silos less effective on a per unit basis.
Cyber deterrence is different.
Cyber deterrence is inextricably riddled with tradeoffs and interdependencies that regular deterrence lacks.
This chapter outlines the essential tradeoffs between cyber deterrence by denial, punishment, entanglement and taboo.
Each case example illustrates how investing heaving in one form of cyber deterrence costs, at margin, in some other category.
Cyber deterrence can be optimized, but only with these essential tradeoffs in mind.

Related Results

An Empirical Study on Cyber Crimes Against Women and Children in India
An Empirical Study on Cyber Crimes Against Women and Children in India
The aim of the study is to understand the Cyber-crimes against women and Children in India for a period of five years from 2017 to 2021. The study is based on Secondary data collec...
THE EVOLUTION OF CYBER RESILIENCE FRAMEWORKS IN NETWORK SECURITY: A CONCEPTUAL ANALYSIS
THE EVOLUTION OF CYBER RESILIENCE FRAMEWORKS IN NETWORK SECURITY: A CONCEPTUAL ANALYSIS
The Evolution of Cyber Resilience Frameworks in Network Security: A Conceptual Analysis provides a comprehensive overview of the development and application of cyber resilience fra...
SECURITISATION OF CYBER SPACE - FROM PRISM OF DETERRENCE STRATEGY
SECURITISATION OF CYBER SPACE - FROM PRISM OF DETERRENCE STRATEGY
<p>Deterrence in cyber space has most often succumbed to the technical and legal limitations of digital and physical world respectively. Cyber deterrence aims to deter an (un...
Reassessing Nuclear Deterrence: Impacts on Global Security and International Relations
Reassessing Nuclear Deterrence: Impacts on Global Security and International Relations
In the context of an increasingly multipolar world and evolving geopolitical tensions, the doctrine of nuclear deterrence remains a pivotal yet contentious component of internation...
Cyber operational risk scenarios for insurance companies
Cyber operational risk scenarios for insurance companies
Abstract Cyber Operational Risk: Cyber risk is routinely cited as one of the most important sources of operational risks facing organisations today, in various publications and ...
Cyber Espionage
Cyber Espionage
Cyberspace gives rise to risks as well as opportunities, and a prominent threat emerging from this domain is cyber espionage. Because no internationally and legally recognized defi...
EFEKTIFITAS CYBER EXTENSION PADA PENYULUH AGAMA DI KOTA SEMARANG
EFEKTIFITAS CYBER EXTENSION PADA PENYULUH AGAMA DI KOTA SEMARANG
Abstrak Artikel ini menyajikan hasil pelaksanaan cyber extension yang dilaksanakan oleh penyuluh agama Kota Semarang, serta efektifitas dari pelaksanaannya. Cyber extension ...
Focused deterrence, strategic management, and effective gun violence prevention
Focused deterrence, strategic management, and effective gun violence prevention
AbstractResearch SummaryThe evaluation literature suggests that focused deterrence strategies are effective in reducing gun violence. However, focused deterrence is notoriously dif...

Back to Top