Description |
1 online resource (xiv, 65 pages). |
|
text txt rdacontent |
|
computer c rdamedia |
|
online resource cr rdacarrier |
Series |
Letort papers |
|
Letort papers.
|
Note |
"December 2016." |
|
Print version available for sale by the Superintendent of Documents, U.S. Government Publishing Office. |
Bibliography |
Includes bibliographical references (pages 56-65). |
Contents |
Three types of criminal deterrent strategies : prevention by design; deterrence by denial; and deterrence by punishment. What can studies of drunk drivers teach us about cyber-deterrence? -- Suggestions for planners -- Why the nuclear analogy is a bad fit. The knowledge problem : attribution, puzzles, and mysteries -- The temporal problem : the iterative nature of cyber-defense -- The learning problem : the payoff of a failed attack -- The populist problem : nuclear deterrence is an elite activity, while cyber-deterrence is not -- Why border deterrence thinking is more applicable than nuclear deterrence thinking. A variety of actors involved in creating and enforcing deterrent strategies -- A variety of different types of trespassers -- We have no strong norms against incursions -- We are fighting a long war against illegal immigration and cyber-incursions -- The (in)effectiveness of using publicity to communicate one's commitment to deterrence -- The problem of asymmetric payoffs : intruders have little incentive not to try again -- We need a strategy and not merely a set of tactics -- Conclusions. |
Summary |
"Perhaps the best starting point for those looking to 'borrow' a deterrent strategy for cyberspace from other fields is not the example of nuclear deterrence but instead the example of United States-Mexican border security. The nuclear deterrent analogy is not the best fit for understanding cyber-deterrence -- due to the ways in which rewards and payoffs for would-be attackers in cyberspace are different from those in the nuclear analogy -- among other factors. The emphasis here is not on deterrent effects provided by specific weapons but rather on the ways in which human actors understand deterrence and risk in making an attempt to violate a border, and the ways in which security architects can manipulate how would-be aggressors think about these border incursions. This Letort Paper thus borrows from the criminology literature rather than the military-security literature in laying out how individuals may be deterred from committing crimes in real space and in cyberspace through manipulating rewards and punishments. Lessons from attempts at deterring illegal immigration along America's borders are then presented, with lessons derived from those situations, which are helpful in understanding how to deter incursions in cyberspace"--Publisher's web site. |
Note |
Description based on online resource; title from PDF title page (SSI, viewed December 14, 2016). |
Access |
Access restricted to subscribing institutions. |
Subject |
Cyberterrorism -- Prevention.
|
|
Cyberspace -- Security measures.
|
|
Deterrence (Strategy)
|
|
Cyberspace -- Security measures.
(OCoLC)fst02031378
|
|
Cyberterrorism -- Prevention.
(OCoLC)fst01905567
|
|
Deterrence (Strategy) (OCoLC)fst00891658
|
Added Author |
Army War College (U.S.). Strategic Studies Institute, publisher.
|
|
Army War College (U.S.). Press, publisher.
|
ISBN |
1584877383 |
|
9781584877387 |
Standard No. |
NLGGC 408609907 |
|
AU@ 000062254295 |
Gpo Item No. |
0307-A-18 (online) |
Sudoc No. |
D 101.146/3:C 99/3 |
|