Item Details
Skip Navigation Links
   ActiveUsers:720Hits:18477903Skip Navigation Links
Show My Basket
Contact Us
IDSA Web Site
Ask Us
Today's News
HelpExpand Help
Advanced search

In Basket
  Journal Article   Journal Article
 

ID156936
Title ProperCyber deterrence and critical-infrastructure protection
Other Title Informationexpectation, application, and limitation
LanguageENG
AuthorWilner, Alex
Summary / Abstract (Note)Linking deterrence theory to cybersecurity policy and critical-infrastructure protection is easier said than done. Recent cybersecurity incidents involving the United States, China, Russia, and North Korea illustrate the yawning gap between cyber deterrence expectations, applications, and results. This article draws on classical deterrence theory to illustrate how the logic of deterrence applies to cybersecurity policy and strategy. By differentiating between physical and digital critical infrastructure protection, the article explores the promises and pitfalls of cyber deterrence in practice. Seven limitations are explored in detail, including: denying digital access, commanding cyber retaliation, observing deterrence failure, thwarting cyber misfits, addressing the cyber power of weakness, attributing cyber attacks, and solidifying red lines.
`In' analytical NoteComparative Strategy Vol. 36, No.1-5; 2017: p.309-318
Journal SourceComparative Strategy Vol: 36 No 1-5
Key WordsCyber Deterrence ;  Critical-infrastructure Protection


 
 
Media / Other Links  Full Text