Deterring Cyber Coercion: the exaggerated problem of attribution/ David Blagden

By: Material type: TextTextPublication details: 2020Subject(s): Online resources: In: Survival: Vol.62, No.1, February - March 2020, pp.131-148 (106)Summary: The political interests being advanced by a cyber attack will often make the identity of the aggressor clear, even if the origin of the attack itself cannot be readily traced via technical means.The prominence of deterrence by punishment in Western cyber strategy has grown in line with capabilities and understanding. The 2011 cyberdefence strategies of the United States and United Kingdom - the two most capable Western cyber powers - did not mention retaliation, although both referred to deterrence and dwelt extensively on hardening and resilience.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Copy number Status Date due Barcode
Journal Article Mindef Library & Info Centre Journals CYBER (Browse shelf(Opens below)) 1 Not for loan 64903-1001

The political interests being advanced by a cyber attack will often make the identity of the aggressor clear, even if the origin of the attack itself cannot be readily traced via technical means.The prominence of deterrence by punishment in Western cyber strategy has grown in line with capabilities and understanding. The 2011 cyberdefence strategies of the United States and United Kingdom - the two most capable Western cyber powers - did not mention retaliation, although both referred to deterrence and dwelt extensively on hardening and resilience.

CYBERSEC, USA, UK, RESILIENCE, STRATEGY

There are no comments on this title.

to post a comment.