The IT Law Wiki


32,581pages on
this wiki
Add New Page
Talk0 Share

Definitions Edit


[is] the historical cornerstone of defense, and attribution — the identification of the perpetrator as well as method of attack — forms the foundation upon which deterrence rests.[1]
consists of essentially two basic components: first, the expressed intention to defend a certain interest; secondly, the demonstrated capability actually to achieve the defense of the interest in question, or to inflict such a cost on the attacker that, even if he should be able to gain his end, it would not seem worth the effort to him.[2]
[d]esigning a system [s]o that an attack would be unprofitable, limited in scope and easily traceable.[3]

Overview Edit

There are two types of deterrence:

deterrence by denial (the ability to frustrate the attacks) and deterrence by punishment (the threat of retaliation).[4]

"Deterrence relies on the idea that inducing a would-be intruder to refrain from acting in a hostile manner is as good as successfully defending against or recovering from a hostile cyber operation. Deterrence through the threat of retaliation is based on imposing negative consequences on adversaries for attempting a hostile operation."[5]

Deterrence is partially a function of perception. It works by convincing a potential adversary that it will suffer unacceptable costs if it conducts an attack on the United States, and by decreasing the likelihood that a potential adversary's attack will succeed. The United States must be able to declare or display effective response capabilities to deter an adversary from initiating an attack; develop effective defensive capabilities to deny a potential attack from succeeding; and strengthen the overall resilience of U.S. systems to withstand a potential attack if it penetrates the United States' defenses.[6]

References Edit

  1. Homeland Security Presidential Directive 10.
  2. Cyberdeterrence and Cyberwar, at 7 (citation omitted).
  3. Cybersecurity A Primer for State Utility Regulators, App. B.
  4. Id.
  5. At the Nexus of Cybersecurity and Public Policy: Some Basic Concepts and Issues, at 86.
  6. The DoD Cyber Strategy, at 11.

See also Edit

Ad blocker interference detected!

Wikia is a free-to-use site that makes money from advertising. We have a modified experience for viewers using ad blockers

Wikia is not accessible if you’ve made further modifications. Remove the custom ad blocker rule(s) and the page will load as expected.