Documents in the NTIS Technical Reports collection are the results of federally funded research. They are directly submitted to or collected by NTIS from Federal agencies for permanent accessibility to industry, academia and the public.  Before purchasing from NTIS, you may want to check for free access from (1) the issuing organization's website; (2) the U.S. Government Printing Office's Federal Digital System website http://www.gpo.gov/fdsys; (3) the federal government Internet portal USA.gov; or (4) a web search conducted using a commercial search engine such as http://www.google.com.
Accession Number ADA562428
Title Deterrence in Cyberspace.
Publication Date Jun 2012
Media Count 81p
Personal Author M. Rivera
Abstract There are significant differences between nuclear attack and cyber attack, but the development of cyber deterrence policy is relevant to the total defense of the United States' critical infrastructure and networked cyber systems. The rapidity, ambiguity of origination, and inexpensiveness of a cyber attack creates a problem that is not easily addressed by the strategies used in the implementation of nuclear deterrence. Similar to the nuclear deterrence policy developed during the Cold War, a policy for deterrence to compliment the United States' defense of its interests in cyberspace is needed today. Influencing the mental calculus of a potential adversary is a critical aspect of defending the nation's interests in cyberspace. Having the capabilities to effectively respond to enemy aggression in cyberspace is critical to deterrence as a strategy to defend the nation's critical infrastructure. The cyber attacks conducted against Georgia and Estonia during their conflicts with Russia demonstrate the ability for widespread effects at very little cost. While the private sector must do more to ensure that critical infrastructure is adequately protected, the government similarly needs to develop better policies to deter cyber attacks. The aspects of nuclear deterrence considered relevant to cyber deterrence in this paper are attribution, penalty, credibility, definition of attack, dependency, counter-productivity, awareness, and futility.
Keywords Attack
Case studies
Critical infrastructure protection
Cyber attacks
Cyber deterrence
Cyberspace policies
Cyberwarfare
Defense industry
Department of defense
Department of homeland security
Deterrence
Estonia
Georgia(Republic)
Homeland security
Infrastructure
Low costs
National strategy
Nuclear deterrence
Nuclear warfare
Policies
Presidential directives
Protection
Russia
Strategy
Stuxnet worm
Theses
United states government


 
Source Agency Non Paid ADAS
NTIS Subject Category 92E - International Relations
50B - Civil Engineering
74G - Military Operations, Strategy, & Tactics
Corporate Author National Defense Univ., Norfolk, VA. Joint Advanced Warfighting School.
Document Type Thesis
Title Note Master's thesis.
NTIS Issue Number 1225
Contract Number N/A

Science and Technology Highlights

See a sampling of the latest scientific, technical and engineering information from NTIS in the NTIS Technical Reports Newsletter

Acrobat Reader Mobile    Acrobat Reader