首页> 外文会议>International Conference on Cyber Conflict >Towards establishment of cyberspace deterrence strategy
【24h】

Towards establishment of cyberspace deterrence strategy

机译:建立网络空间威慑策略

获取原文

摘要

The question of whether strategic deterrence in cyberspace is achievable given the challenges of detection, attribution and credible retaliation is a topic of contention among military and civilian defense strategists. This paper examines the traditional strategic deterrence theory and its application to deterrence in cyberspace (the newly defined 5th battlespace domain, following land, air, sea and space domains), which is being used increasingly by nation-states and their proxies to achieve information dominance and to gain tactical and strategic economic and military advantage. It presents a taxonomy of cyberattacks that identifies which types of threats in the confidentiality, integrity, availability cybersecurity model triad present the greatest risk to nation-state economic and military security, including their political and social facets. The argument is presented that attacks on confidentiality cannot be subject to deterrence in the current international legal framework and that the focus of strategy needs to be applied to integrity and availability attacks. A potential cyberdeterrence strategy is put forth that can enhance national security against devastating cyberattacks through a credible declaratory retaliation capability that establishes red lines which may trigger a counter-strike against all identifiable responsible parties. The author believes such strategy can credibly influence nation-state threat actors who themselves exhibit serious vulnerabilities to cyber attacks from launching a devastating cyber first strike.
机译:鉴于检测,归因和可信报复的挑战,可实现网络空间战略威慑的问题是军事和民事防范战略家之间的争论主题。本文审查了传统的战略威慑理论及其在网络空间中威慑的应用(新定义的第5次战斗空间领域,之后的土地,空中,海和空间域),这些国家正在越来越多地被国家和他们的代理实现信息统治并获得战术和战略经济和军事优势。它介绍了网络学的分类,识别保密,完整性,可用性网络安全模型三合会对国家经济和军事安全的最大风险,包括其政治和社会方面的威胁。提出了论证,即对当前的国际法律框架的威慑性无法受到威慑,并需要施加策略的重点,以适应完整性和可用性攻击。提出潜在的网络投入策略,可以通过可信的宣言报复能力来提高国家安全,通过可信的宣言报复能力,该宣言能够建立红线,这可能引发反对所有可识别的责任缔约方的反击。提交人认为,这种战略可以可靠地影响国家 - 国家威胁行动者,他们本身就展示了对网络攻击的严重脆弱性,从发起毁灭性的网络攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号