2012
DOI: 10.2139/ssrn.2070438
|View full text |Cite
|
Sign up to set email alerts
|

Cyber Deterrence

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0
1

Year Published

2015
2015
2022
2022

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(7 citation statements)
references
References 19 publications
0
6
0
1
Order By: Relevance
“…According to Lupovici, in order for deterrence to be successful through punishment, the abilities (capacity) of the deterrent, the reliability of the retaliation threat, and the retaliation threat must be announced to the attacker successfully. In [20], Jensen states that deterrence in cyber space, in addition to traditional retaliation, does more legal action than traditional deterrence methods in the nuclear age of the cold war, and offers options such as making networks invisible, flexible, and interconnected, while struggling to defend the networks and infrastructures of nations. omasen's book, Cyber Deterrence-A 21st Century Maginot Line [21], emphasizes that ensuring cyber security is among the top threats faced by modern states.…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…According to Lupovici, in order for deterrence to be successful through punishment, the abilities (capacity) of the deterrent, the reliability of the retaliation threat, and the retaliation threat must be announced to the attacker successfully. In [20], Jensen states that deterrence in cyber space, in addition to traditional retaliation, does more legal action than traditional deterrence methods in the nuclear age of the cold war, and offers options such as making networks invisible, flexible, and interconnected, while struggling to defend the networks and infrastructures of nations. omasen's book, Cyber Deterrence-A 21st Century Maginot Line [21], emphasizes that ensuring cyber security is among the top threats faced by modern states.…”
Section: Methodsmentioning
confidence: 99%
“…Based on various thoughts, approaches, and practices on cyber deterrence [1,[14][15][16][17][18][19][20][21][22], it is seen that the strategy on this issue generally consists of two basic classifications as indicated in Figure 2. Prevention/frustration aims to prevent attacks and actions and frustrate the attackers' cyber security and defence capacity, further increased with its intelligence, detection and attribution, prevention, assurance, etc.…”
Section: National Cyber Security Strategy and Policymentioning
confidence: 99%
“…O terceiro desafio à dissuasão cibernética é a proporcionalidade que, baseando-se nos princípios expressos nas Convenções de Genebra, de 1949, sobre conflito armado, bem como no Manual de Tallinn (Schmitt, 2016), defende a assimilação da guerra cibernética na guerra convencional. Nesse sentido, estabelece-se que uma ação no ciberespaço precisa ser proporcional, principalmente quando essas ações são supostamente provocadas pelos próprios Estados ou por atores patrocinados por eles -ou seja, deve ser comparável e não provocar uma escalada (Jensen, 2012). Por uma série de razões, contudo, é difícil alcançar a proporcionalidade no ciberespaço -isso porque qualquer resposta deve refletir a quantidade (proporcional) do dano causado a um alvo que foi atingido.…”
Section: Tradução Nossa)unclassified
“…The problem of deterrence theory is considered in general in [10]. This means that the type of sanctions may be different in nature from the type of attack as long as the condition of proportionality holds.…”
Section: Literature Review and Problem Staitmentmentioning
confidence: 99%