Introduction: The Cyber Deterrence Problem / Aaron Brantly -- The Limits of Deterrence and the Need for Persistence / Michael P. Fischerkeller, Richard J. Harknett, Jelena Vicic -- Cyber Escalation and Deterrence / Andrew Owsiak -- Cyber Deterrence and Critical Infrastructure / Jacquelyn Schneider -- Deterrence is about Shaping an Adversary / Eric Jardine -- The Credibility of Cyber Deterrence Commitments: The Role and Nature of Public Support for Retaliation / Jeffery Berejikian and Samuel Wallace Marcott -- A Micro-Deterrence Approach to Cyber Defense / Damien Van Puyvelde -- Deterring Malicious Cyber Activity Through Norms and Governance / Aislinn McCann -- Back to Reality: Cross Domain Deterrence and Cyberspace / Aaron Brantly
Summary:
The national security of the United States depends on a secure, reliable and resilient cyberspace. The inclusion of digital systems into every aspect of US national security has been underway since World War II and has increased with the proliferation of Internet-enabled devices. There is an increasing need to develop a robust deterrence framework within which the United States and its allies can dissuade would-be adversaries from engaging in various cyber activities. Yet despite a desire to deter adversaries, the problems associated with dissuasion remain complex, multifaceted, poorly understood and imprecisely specified. Challenges, including credibility, attribution, escalation and conflict management, remain ever-present and challenge the United States in its efforts to foster security in cyberspace. These challenges need to be addressed in a deliberate and multidisciplinary approach that combines political and technical realities to provide a robust set of policy options to decision makers. -- Provided by publisher. "The Cyber Deterrence Problem brings together a multi-disciplinary team of scholars from multiple institutions to analyze and develop a robust assessment of the necessary requirements and attributes for achieving deterrence in cyberspace"-- Provided by publisher.
This resource is supported by the Institute of Museum and Library Services under the provisions of the Library Services and Technology Act as administered by State Library of Iowa.