Cyber-Deterrence

LAW, POLICY AND TECHNOLOGY: CYBERTERRORISM, INFORMATION, WARFARE, DIGITAL AND INTERNET IMMOBILIZATION, IGI Global, 2010

62 Pages Posted: 1 Feb 2009 Last revised: 5 Aug 2014

K. A. Taipale

Center for Advanced Studies in Science and Technology Policy

Date Written: January 1, 2009

Abstract

To counteract the threat of potentially catastrophic cyber-attacks against critical infrastructure, policy makers are increasingly contemplating the use of deterrence strategies to supplement cyber-defense. Deterrence has traditionally focused primarily on threatening a potential attacker with a punishing response in order to deter attacks from occurring. However, because of the particular characteristics of cyberspace a general deterrence policy based on threatened retaliation may not be sufficient to deter, and, in some circumstances, may be counter-productive. Thus, this chapter examines an expanded framework for cyber-deterrence policy that includes four factors: (1) penalty (the familiar notion of increasing the cost of attack through punishment), (2) futility (the notion of frustrating attack through resilience or recovery capabilities), (3) dependency (the notion of interdependence as a moderating influence), and (4) counter-productivity (the notion that collateral backlash can check behavior).

Keywords: cyber-deterrence, cyber-war, cyber-attack, cybercrime, information warfare, critical infrastructure protection

Suggested Citation

Taipale, K. A., Cyber-Deterrence (January 1, 2009). LAW, POLICY AND TECHNOLOGY: CYBERTERRORISM, INFORMATION, WARFARE, DIGITAL AND INTERNET IMMOBILIZATION, IGI Global, 2010. Available at SSRN: https://ssrn.com/abstract=1336045

K. A. Taipale (Contact Author)

Center for Advanced Studies in Science and Technology Policy ( email )

100 Hudson Street
10th Floor E
New York, NY 10013-2882
United States

Paper statistics

Downloads
1,410
Rank
9,907
Abstract Views
6,268