Skip to content
Journal article

The challenge of cyber attack deterrence

Computer Law and Security Review, vol. 26, issue 3 (2010) pp. 298-303

  • 153

    Readers

    Mendeley users who have this article in their library.
  • 18

    Citations

    Citations of this article.
  • 10.0k

    Views

    ScienceDirect users who have downloaded this article.
Sign in to save reference

Abstract

National security planners have begun to look beyond reactive, tactical cyber defense to proactive, strategic cyber defense, which may include international military deterrence. The incredible power of nuclear weapons gave birth to deterrence, a military strategy in which the purpose of armies shifted from winning wars to preventing them. Although cyber attacks per se do not compare to a nuclear explosion, they do pose a serious and increasing threat to international security. Real-world examples suggest that cyber warfare will play a lead role in future international conflicts. This article examines the two deterrence strategies available to nation-states (denial and punishment) and their three basic requirements (capability, communication, and credibility) in the light of cyber warfare. It also explores whether the two most challenging aspects of cyber attacks-attribution and asymmetry-will make cyber attack deterrence an impossible task. ?? 2010 Xiaolu Zhang. Published by Elsevier Ltd. Allrights reserved.

Author-supplied keywords

  • Critical infrastructure
  • Cyber attack
  • Deterrence
  • Hacker
  • Internet
  • Military strategy
  • Nuclear
  • Security
  • War

Get free article suggestions today

Mendeley saves you time finding and organizing research

Sign up here
Already have an account ?Sign in

Find this document

Get full text

Authors

  • Kenneth Geers

Cite this document

Choose a citation style from the tabs below