2017
DOI: 10.1162/isec_a_00267
|View full text |Cite
|
Sign up to set email alerts
|

What Is the Cyber Offense-Defense Balance? Conceptions, Causes, and Assessment

Abstract: Most scholars and policymakers claim that cyberspace favors the offense; a minority of scholars disagree. Sweeping claims about the offense-defense balance in cyberspace are misguided because the balance can be assessed only with respect to specific organizational skills and technologies. The balance is defined in dyadic terms, that is, the value less the costs of offensive operations and the value less the costs of defensive operations. The costs of cyber operations are shaped primarily by the organizational … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
44
0
1

Year Published

2017
2017
2024
2024

Publication Types

Select...
6
4

Relationship

1
9

Authors

Journals

citations
Cited by 105 publications
(45 citation statements)
references
References 52 publications
0
44
0
1
Order By: Relevance
“…Security controls for these vulnerabilities, such as scanning systems for known software problems and fixing them, are also well-known. The larger problem is implementing those controls in extremely complex and highly interconnected systems (Slayton 2017).…”
Section: Conceptualizing Information Security Governancementioning
confidence: 99%
“…Security controls for these vulnerabilities, such as scanning systems for known software problems and fixing them, are also well-known. The larger problem is implementing those controls in extremely complex and highly interconnected systems (Slayton 2017).…”
Section: Conceptualizing Information Security Governancementioning
confidence: 99%
“…involves the use of the internet for espionage" (Gartzke, 2013, p. 70). The limited effectiveness of cyber operations as means of warfare, coercion and destruction has since been emphasized by an increasing number of scholars (Borghard & Lonergan, 2017;Slayton, 2017;Smeets, 2018). In short, acts of violence or physical destruction involve non-trivial operational challenges that only powerful actors are both likely to overcome and unlikely to have interests in, given other more reliable ways of generating coercive harm.…”
Section: The Problem: What Do We Know?mentioning
confidence: 99%
“…Moreover, difficulty in recognizing offensive and defensive nature of cyber capabilities also exaggerate the security dilemma. Despite the fact that states are guided by primarily defensive interests, however, increase in such capabilities enhanced other's threat perceptions (Slayton, 2016/17).…”
Section: Enhanced Security Dilemmamentioning
confidence: 99%