Art02-网络威慑问题

ID:23700

阅读量:0

大小:2.05 MB

页数:24页

时间:2022-11-29

金币:15

上传者:战必胜
31
The Cyber
Deterrence Problem
Abstract: What is the role of deterrence in an age where adept hackers can credibly
hold strategic assets at risk? Do conventional frameworks of deterrence maintain
their applicability and meaning against state actors in cyberspace? Is it possible
to demonstrate credibility with either in-domain or cross-domain signaling or is
cyberspace fundamentally ill-suited to the application of deterrence frameworks?
Building on concepts from both rational deterrence theory and cognitive theories of
deterrence this work attempts to leverage relevant examples from both within and
beyond cyberspace to examine applicability of deterrence in the digital age and for
digital tools in an effort to shift the conversation from Atoms to Bits and Bytes.
Keywords: cyber, deterrence, denial, punishment
Aaron F. Brantly
Assistant Professor, Department of Political Science
Virginia Polytechnic and State University
United States
abrantly@vt.edu
2018 10th International Conference on Cyber Conict
CyCon X: Maximising Eects
T. Minárik, R. Jakschis, L. Lindström (Eds.)
2018 © NATO CCD COE Publications, Tallinn
Permission to make digital or hard copies of this publication for internal
use within NATO and for personal or educational use when for non-prot or
non-commercial purposes is granted providing that copies bear this notice
and a full citation on the rst page. Any other reproduction or transmission
requires prior written permission by NATO CCD COE.
1. IntroductIon
The challenge of the digital era is not to dene deterrence. Deterrence is a well-
dened concept that has been studied and practiced throughout history and to an
even greater depth following the advent of nuclear weapons. The present challenge
it is to understand the role digital technologies play in the broader scope of interstate
deterrence. Deterrence in one domain rarely if ever operates independently of other
domains. Much of the literature on cyber deterrence focuses on within domain
deterrence. Yet, this is a dangerous constraint that elevates risks and minimizes the
probability of success. This paper seeks to draw out the literature on deterrence and
identify its applicability within a newly delineated domain of interactions, cyberspace.
The resultant analysis strives to encompass the complexity of deterrence and advance
an argument beyond within domain modeling.
资源描述:

当前文档最多预览五页,下载文档查看全文

此文档下载收益归作者所有

当前文档最多预览五页,下载文档查看全文
温馨提示:
1. 部分包含数学公式或PPT动画的文件,查看预览时可能会显示错乱或异常,文件下载后无此问题,请放心下载。
2. 本文档由用户上传,版权归属用户,天天文库负责整理代发布。如果您对本文档版权有争议请及时联系客服。
3. 下载前请仔细阅读文档内容,确认文档内容符合您的需求后进行下载,若出现内容与标题不符可向本站投诉处理。
4. 下载文档时可能由于网络波动等原因无法下载或下载错误,付费完成后未能成功下载的用户请联系客服处理。
关闭