Definitions Edit


[is] the historical cornerstone of defense, and attribution — the identification of the perpetrator as well as method of attack — forms the foundation upon which deterrence rests.[1]
consists of essentially two basic components: first, the expressed intention to defend a certain interest; secondly, the demonstrated capability actually to achieve the defense of the interest in question, or to inflict such a cost on the attacker that, even if he should be able to gain his end, it would not seem worth the effort to him.[2]
[is d]esigning a system [s]o that an attack would be unprofitable, limited in scope and easily traceable.[3]
operates by affecting the calculations of an adversary, specifically by convincing the adversary that the expected costs of a potential act (a type of attack or costly cyber intrusion) outweigh the expected benefits.[4]

Overview Edit

There are two types of deterrence:

deterrence by denial (the ability to frustrate the attacks) and deterrence by punishment (the threat of retaliation).[5]

"Deterrence relies on the idea that inducing a would-be intruder to refrain from acting in a hostile manner is as good as successfully defending against or recovering from a hostile cyber operation. Deterrence through the threat of retaliation is based on imposing negative consequences on adversaries for attempting a hostile operation."[6]

Deterrence is partially a function of perception. It works by convincing a potential adversary that it will suffer unacceptable costs if it conducts an attack on the United States, and by decreasing the likelihood that a potential adversary's attack will succeed. The United States must be able to declare or display effective response capabilities to deter an adversary from initiating an attack; develop effective defensive capabilities to deny a potential attack from succeeding; and strengthen the overall resilience of U.S. systems to withstand a potential attack if it penetrates the United States' defenses.[7]

References Edit

  1. Homeland Security Presidential Directive 10.
  2. Cyberdeterrence and Cyberwar, at 7 (citation omitted).
  3. Cybersecurity A Primer for State Utility Regulators, App. B.
  4. Task Force on Cyber Deterrence, at 3.
  5. Id.
  6. At the Nexus of Cybersecurity and Public Policy: Some Basic Concepts and Issues, at 86.
  7. The DoD Cyber Strategy, at 11.

See also Edit

Ad blocker interference detected!

Wikia is a free-to-use site that makes money from advertising. We have a modified experience for viewers using ad blockers

Wikia is not accessible if you’ve made further modifications. Remove the custom ad blocker rule(s) and the page will load as expected.