Kids Library Home

Welcome to the Kids' Library!

Search for books, movies, music, magazines, and more.

     
Available items only
Print Material
Author Manjikian, Mary, author.

Title Deterring cybertrespass and securing cyberspace : lessons from United States border control strategies / Mary Manjikian.

Publication Info. Carlisle, PA : Strategic Studies Institute and U.S. Army War College Press, 2016.

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  D 101.146/3:C 99/3    ---  Available
Description 1 online resource (xiv, 65 pages).
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
Series Letort papers
Letort papers.
Note "December 2016."
Print version available for sale by the Superintendent of Documents, U.S. Government Publishing Office.
Bibliography Includes bibliographical references (pages 56-65).
Contents Three types of criminal deterrent strategies : prevention by design; deterrence by denial; and deterrence by punishment. What can studies of drunk drivers teach us about cyber-deterrence? -- Suggestions for planners -- Why the nuclear analogy is a bad fit. The knowledge problem : attribution, puzzles, and mysteries -- The temporal problem : the iterative nature of cyber-defense -- The learning problem : the payoff of a failed attack -- The populist problem : nuclear deterrence is an elite activity, while cyber-deterrence is not -- Why border deterrence thinking is more applicable than nuclear deterrence thinking. A variety of actors involved in creating and enforcing deterrent strategies -- A variety of different types of trespassers -- We have no strong norms against incursions -- We are fighting a long war against illegal immigration and cyber-incursions -- The (in)effectiveness of using publicity to communicate one's commitment to deterrence -- The problem of asymmetric payoffs : intruders have little incentive not to try again -- We need a strategy and not merely a set of tactics -- Conclusions.
Summary "Perhaps the best starting point for those looking to 'borrow' a deterrent strategy for cyberspace from other fields is not the example of nuclear deterrence but instead the example of United States-Mexican border security. The nuclear deterrent analogy is not the best fit for understanding cyber-deterrence -- due to the ways in which rewards and payoffs for would-be attackers in cyberspace are different from those in the nuclear analogy -- among other factors. The emphasis here is not on deterrent effects provided by specific weapons but rather on the ways in which human actors understand deterrence and risk in making an attempt to violate a border, and the ways in which security architects can manipulate how would-be aggressors think about these border incursions. This Letort Paper thus borrows from the criminology literature rather than the military-security literature in laying out how individuals may be deterred from committing crimes in real space and in cyberspace through manipulating rewards and punishments. Lessons from attempts at deterring illegal immigration along America's borders are then presented, with lessons derived from those situations, which are helpful in understanding how to deter incursions in cyberspace"--Publisher's web site.
Note Description based on online resource; title from PDF title page (SSI, viewed December 14, 2016).
Access Access restricted to subscribing institutions.
Subject Cyberterrorism -- Prevention.
Cyberspace -- Security measures.
Deterrence (Strategy)
Cyberspace -- Security measures. (OCoLC)fst02031378
Cyberterrorism -- Prevention. (OCoLC)fst01905567
Deterrence (Strategy) (OCoLC)fst00891658
Added Author Army War College (U.S.). Strategic Studies Institute, publisher.
Army War College (U.S.). Press, publisher.
ISBN 1584877383
9781584877387
Standard No. NLGGC 408609907
AU@ 000062254295
Gpo Item No. 0307-A-18 (online)
Sudoc No. D 101.146/3:C 99/3

 
    
Available items only