首页> 外文学位 >Strategic cyber deterrence.
【24h】

Strategic cyber deterrence.

机译:战略性网络威慑。

获取原文
获取原文并翻译 | 示例

摘要

The world has witnessed two cyber wars, the first between Estonia and Russia in 2007 and the second between Georgia and Russia in 2008. In both of these wars, the same problem existed and will continue to proliferate as without imposed costs and/or denied benefits, state and non-state actors will further develop and refine capabilities that have the ability to take advantage of cyber vulnerabilities.;The scope of this study is to understand the nature of cyber war and its purpose in order to develop a theory of cyber deterrence. An initial challenge surfaced because of a lack of definitional consistency for terminology in the cyber domain. To address this challenge, I relied upon time-tested Clausewitzian ideals to define cyber war as the continuation of state policy by cyber means.;The principal research question focused on developing requirements for cyber deterrence theory that are applicable to cyber war. The requirements that emerged were grounded in preceding deterrence theories and forged from a vulnerability-based assessment of the existing cases of cyber war. I closely analyzed exploited and unexploited vulnerabilities to help inform the requirements for cyber deterrence by denial. This permitted me to reverse engineer what actually occurred to design a theory that may prove more relevant to deterring cyber war in other cases. In the course of the case studies, I learned that cooperation appears to play a larger role in cyber deterrence than earlier forms of deterrence theory. This inspired a theory of cyber deterrence based upon denial, punishment, and cooperation.;Four hypotheses informed by basic deterrence, criminal justice deterrence, and nuclear deterrence theories were rooted in a critical question regarding the cyber domain: How is cyber deterrence possible if attribution, offensive capabilities, defensive capabilities, or cooperative relationships are either missing from or inadequate to deter a malicious actor?;The hypotheses, structured on the triadic components of denial, punishment, and cooperation, were tested using the two cases of cyber war. What I discovered in the process of analyzing and evaluating the cases and then synthesizing this with the literature left me with neither a full account of what is possible nor an account of what is not possible. Instead, the analysis indicated the presence of a middle ground where cyber deterrence becomes conditional and/or variable in its effectiveness based on attention or inattention to the triadic components.;This means that cyber deterrence requires tailoring for different classes of actors based on their kinetic and non-kinetic capabilities. It also means that the elements, which comprise the triadic components, require constant attention because of the rapid pace of technological developments. Because of these developments, capabilities and vulnerabilities constantly expand and contract, which indicates that the effectiveness of cyber deterrence is perhaps more conditional as a function of time than previous deterrence variants.
机译:世界目睹了两次网络战争,第一次是在2007年爱沙尼亚与俄罗斯之间的战争,第二次是在2008年在格鲁吉亚与俄罗斯之间的战争。在这两种战争中,都存在着相同的问题,并且由于没有施加成本和/或剥夺利益而继续存在。 ,国家和非国家行为者将进一步开发和完善具有利用网络漏洞的能力的能力。本研究的范围是了解网络战争的性质及其目的,以发展网络威慑理论。由于缺乏网络领域中术语的定义一致性,最初的挑战浮出水面。为了应对这一挑战,我依靠久经考验的克劳塞维兹主义理论将网络战争定义为通过网络手段延续国家政策。主要研究问题集中在发展适用于网络战争的网络威慑理论的要求上。出现的要求以先前的威慑理论为基础,并基于对现有网络战争案例的基于漏洞的评估而形成。我仔细分析了已利用和未利用的漏洞,以通过拒绝帮助告知对网络威慑的要求。这使我可以逆向工程实际发生的事情,从而设计出一种理论,该理论可能在其他情况下与遏制网络战争更为相关。在案例研究过程中,我了解到合作似乎比早期形式的威慑理论在网络威慑中发挥更大的作用。这激发了基于拒绝,惩罚和合作的网络威慑理论。基于基本威慑,刑事司法威慑和核威慑理论的四个假设都植根于有关网络领域的一个关键问题:如果归因于网络威慑又怎么可能,攻击能力,防御能力或合作关系是否缺失或不足以阻止恶意行为者?;基于否认,惩罚和合作三方组成的假说是使用网络战争的两种情况进行检验的。我在分析和评估案例,然后将其与文献进行综合的过程中发现的东西,使我既没有充分考虑可能的情况,也没有充分考虑不可能的情况。取而代之的是,分析表明存在中间立场,网络威慑因对三合会成分的关注或不注意而成为条件性的和/或可变的;;这意味着网络威慑需要根据其行为的动态来针对不同类别的参与者进行定制和非运动能力。这也意味着,由于技术发展的迅速步伐,构成三元组件的元素需要不断关注。由于这些发展,能力和脆弱性不断扩大和收缩,这表明网络威慑的有效性可能是时间的函数,它比以前的威慑变体更有条件。

著录项

  • 作者单位

    Fletcher School of Law and Diplomacy (Tufts University).;

  • 授予单位 Fletcher School of Law and Diplomacy (Tufts University).;
  • 学科 International relations.;Military studies.;Information technology.;International law.
  • 学位 Ph.D.
  • 年度 2012
  • 页码 423 p.
  • 总页数 423
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号