首页> 外文会议>2011 3rd International Conference on Cyber Conflict >Towards establishment of cyberspace deterrence strategy
【24h】

Towards establishment of cyberspace deterrence strategy

机译:建立网络空间威慑战略

获取原文

摘要

The question of whether strategic deterrence in cyberspace is achievable given the challenges of detection, attribution and credible retaliation is a topic of contention among military and civilian defense strategists. This paper examines the traditional strategic deterrence theory and its application to deterrence in cyberspace (the newly defined 5th battlespace domain, following land, air, sea and space domains), which is being used increasingly by nation-states and their proxies to achieve information dominance and to gain tactical and strategic economic and military advantage. It presents a taxonomy of cyberattacks that identifies which types of threats in the confidentiality, integrity, availability cybersecurity model triad present the greatest risk to nation-state economic and military security, including their political and social facets. The argument is presented that attacks on confidentiality cannot be subject to deterrence in the current international legal framework and that the focus of strategy needs to be applied to integrity and availability attacks. A potential cyberdeterrence strategy is put forth that can enhance national security against devastating cyberattacks through a credible declaratory retaliation capability that establishes red lines which may trigger a counter-strike against all identifiable responsible parties. The author believes such strategy can credibly influence nation-state threat actors who themselves exhibit serious vulnerabilities to cyber attacks from launching a devastating cyber first strike.
机译:鉴于检测,归属和可信报复的挑战是军事和民事防范战略家之间的争论的主题,可实现网络空间中战略威慑是否可实现的问题。本文审查了传统的战略威慑理论及其在网络空间中威慑的应用(新定义的第5次战斗空间领域,土地,空中,海和空间域名),其越来越多地被国家州和其代理实现了信息优势并获得战术和战略经济和军事优势。它介绍了网络学的分类,识别在机密性,完整性,可用性网络安全模型三合会对国家经济和军事安全的最大风险,包括其政治和社会方面的威胁。提出了关于机密性的攻击不能受到当前国际法律框架的威慑,并需要策略的重点适用于完整性和可用性攻击。提出潜在的网络投入策略,可以通过可信的宣言报复能力来加强国家安全,以通过可信的宣告报复能力来确定可能引发反对所有可识别的责任各方的反击。作者认为,这种战略可以可靠地影响国家 - 国家威胁行动者,他们自己展示了对网络攻击的严重脆弱性,从发起毁灭性的网络攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号