File:DETERRENCE AND CYBER-WEAPONS (IA deterrenceandcyb1094532836).pdf

From Wikimedia Commons, the free media repository
Jump to navigation Jump to search
Go to page
next page →
next page →
next page →

Original file(1,275 × 1,650 pixels, file size: 623 KB, MIME type: application/pdf, 88 pages)

Captions

Captions

Add a one-line explanation of what this file represents

Summary[edit]

DETERRENCE AND CYBER-WEAPONS   (Wikidata search (Cirrus search) Wikidata query (SPARQL)  Create new Wikidata item based on this file)
Author
Hemmer, Patrick T.
image of artwork listed in title parameter on this page
Title
DETERRENCE AND CYBER-WEAPONS
Publisher
Monterey, California. Naval Postgraduate School
Description

Rapid technological advancements and societal inclusion of these technologies have expanded civil and defense capabilities but have also created significant vulnerabilities. Cyber-weapons have the potential to affect interaction between states by exploiting this vulnerability. To better understand the mechanics of how cyber-weapons affect state relations this research applies a common framework to explore the attributes of traditional weaponsconventional, nuclear, and RMAand how they typically influence this behavior. After proposing selected factors that influence the effectiveness of a cyber-attack, the research examines the cyber-attacks in 2007 on Estonia and 2008 on Georgia in order to refine and provide nuanced analysis on the role of the proposed causal factors. The proposed factors are government involvement, level of attack sophistication, and the degree to which the state is dependent upon digitally connected technology. The research indicates that the role of the state is one of the most significant factors in influencing the effectiveness of a cyber-attack and highlights the role that plausible deniability plays in this relationship. Some initial policy recommendations are made based on the finding that the use of cyber-weapons as a deterrent is still ill-defined and that the focus should be on decreasing state vulnerability to these attacks.


Subjects: Cyber-deterrence; offensive cyber-attacks; Estonian cyber-attacks; Georgian cyber-attacks
Language English
Publication date March 2013
Current location
IA Collections: navalpostgraduateschoollibrary; fedlink
Accession number
deterrenceandcyb1094532836
Source
Internet Archive identifier: deterrenceandcyb1094532836
https://archive.org/download/deterrenceandcyb1094532836/deterrenceandcyb1094532836.pdf
Permission
(Reusing this file)
This publication is a work of the U.S. Government as defined
in Title 17, United States Code, Section 101. As such, it is in the
public domain, and under the provisions of Title 17, United States
Code, Section 105, is not copyrighted in the U.S.

Licensing[edit]

Public domain
This work is in the public domain in the United States because it is a work prepared by an officer or employee of the United States Government as part of that person’s official duties under the terms of Title 17, Chapter 1, Section 105 of the US Code. Note: This only applies to original works of the Federal Government and not to the work of any individual U.S. state, territory, commonwealth, county, municipality, or any other subdivision. This template also does not apply to postage stamp designs published by the United States Postal Service since 1978. (See § 313.6(C)(1) of Compendium of U.S. Copyright Office Practices). It also does not apply to certain US coins; see The US Mint Terms of Use.

File history

Click on a date/time to view the file as it appeared at that time.

Date/TimeThumbnailDimensionsUserComment
current07:26, 17 July 2020Thumbnail for version as of 07:26, 17 July 20201,275 × 1,650, 88 pages (623 KB) (talk | contribs)FEDLINK - United States Federal Collection deterrenceandcyb1094532836 (User talk:Fæ/IA books#Fork8) (batch 1993-2020 #13642)

Metadata