Deterring Cyber Coercion: the exaggerated problem of attribution/ David Blagden

By: Material type: TextTextPublication details: 2020Subject(s): Online resources: In: Survival: Vol.62, No.1, February - March 2020, pp.131-148 (106)Summary: The political interests being advanced by a cyber attack will often make the identity of the aggressor clear, even if the origin of the attack itself cannot be readily traced via technical means.The prominence of deterrence by punishment in Western cyber strategy has grown in line with capabilities and understanding. The 2011 cyberdefence strategies of the United States and United Kingdom - the two most capable Western cyber powers - did not mention retaliation, although both referred to deterrence and dwelt extensively on hardening and resilience.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)

The political interests being advanced by a cyber attack will often make the identity of the aggressor clear, even if the origin of the attack itself cannot be readily traced via technical means.The prominence of deterrence by punishment in Western cyber strategy has grown in line with capabilities and understanding. The 2011 cyberdefence strategies of the United States and United Kingdom - the two most capable Western cyber powers - did not mention retaliation, although both referred to deterrence and dwelt extensively on hardening and resilience.

CYBERSEC, USA, UK, RESILIENCE, STRATEGY

There are no comments on this title.

to post a comment.