SØG - mellem flere end 8 millioner bøger:
Viser: Optimizing Cyberdeterrence - A Comprehensive Strategy for Preventing Foreign Cyberattacks
A Comprehensive Strategy for Preventing Foreign Cyberattacks
om ca. 10 hverdage
Detaljer om varen
- Hardback: 302 sider
- Udgiver: Georgetown University Press (Marts 2017)
- ISBN: 9781626164130
Cyberattacks are one of the greatest fears for governments and the private sector. The attacks come without warning and can be extremely costly and embarrassing.
Robert Mandel offers a unique and comprehensive strategic vision for how governments, in partnership with the private sector, can deter cyberattacks from both nonstate and state actors. Cyberdeterrence must be different from conventional military or nuclear deterrence, which are mainly based on dissuading an attack by forcing the aggressor to face unacceptable costs. In the cyber realm, where attributing a specific attack to a specific actor is extremely difficult, conventional deterrence principles are not enough. Mandel argues that cyberdeterrence must alter a potential attacker's decision calculus by not only raising costs for the attacker but also by limiting the prospects for gain. Cyberdeterrence must also involve indirect unorthodox restraints, such as exposure to negative blowback and deceptive diversionary measures, and cross-domain measures rather than just retaliation in kind.
The book includes twelve twenty-first-century cyberattack case studies to draw insights into cyberdeterrence and determine the conditions under which it works most effectively. Mandel concludes by making recommendations for implementing cyberdeterrence and integrating it into broader national security policy. Cyber policy practitioners and scholars will gain valuable and current knowledge from this excellent study.
1. Foreign Cyberthreat Dangers
2. Cyberdeterrence Paradoxes
3. Obstacles to Forward Progress
4. Cyberattack Case Studies
5. Case Study Patterns
6. Improving Cyberdeterrence Planning
7. Improving Cyberdeterrence Execution
8. When Cyberdeterrence Works Best Conclusion BibliographyIndexAbout the Author