dc.creator |
George C. Salmoiraghi |
|
dc.creator |
Sharon L. Cardash |
|
dc.creator |
Frank J. Cilluffo |
|
dc.date |
2012-12-01T00:00:00Z |
|
dc.date.accessioned |
2015-07-20T20:09:35Z |
|
dc.date.available |
2015-07-20T20:09:35Z |
|
dc.identifier |
2307-793X |
|
dc.identifier |
2307-8634 |
|
dc.identifier |
https://doaj.org/article/2f06cff04b504ea8a8bc341e704ad6ce |
|
dc.identifier.uri |
http://evidence.thinkportal.org/handle/123456789/9119 |
|
dc.identifier.uri |
https://doaj.org/article/2f06cff04b504ea8a8bc341e704ad6ce |
|
dc.description |
Cyber threats pose a real and growing problem, and to date, United States efforts to counter them have lagged. While the ability to defend against an attack or intrusion must be maintained, the US, like any country, would be well served by deterring its adversaries from acting in the first place – at least when it comes to the most serious of actions, namely cyber warfare. Clearly not all hostile behavior can be deterred, but it is important to identify priorities in this regard and determine how best to address those that lead the list. Despite animated discussions, development of a grand unified solution has remained elusive, in part because the complexity and crosscutting nature of cyber deterrence requires a comprehensive and cohesive solution that encompasses stakeholders in both the private and public sectors. |
|
dc.language |
English |
|
dc.publisher |
Institute for National Security Studies |
|
dc.relation |
http://d26e8pvoto2x3r.cloudfront.net/uploadimages/systemfiles/masa4-3engc_cilluffo.pdf |
|
dc.relation |
https://doaj.org/toc/2307-793X |
|
dc.relation |
https://doaj.org/toc/2307-8634 |
|
dc.rights |
CC BY |
|
dc.source |
Military and Strategic Affairs, Vol 4, Iss 3, Pp 3-23 (2012) |
|
dc.subject |
cyberspace |
|
dc.subject |
cyber domain |
|
dc.subject |
intelligence |
|
dc.subject |
state actors |
|
dc.subject |
non-state actors |
|
dc.subject |
cyber threat |
|
dc.subject |
cybersecurity |
|
dc.subject |
cyber criminals |
|
dc.subject |
terrorist groups |
|
dc.subject |
terrorism |
|
dc.subject |
cyber attacks |
|
dc.subject |
China |
|
dc.subject |
United States |
|
dc.subject |
deterrence |
|
dc.subject |
Military Science |
|
dc.subject |
U |
|
dc.subject |
DOAJ:Military Science |
|
dc.subject |
DOAJ:Technology and Engineering |
|
dc.subject |
Military Science |
|
dc.subject |
U |
|
dc.subject |
DOAJ:Military Science |
|
dc.subject |
DOAJ:Technology and Engineering |
|
dc.subject |
Military Science |
|
dc.subject |
U |
|
dc.subject |
Military Science |
|
dc.subject |
U |
|
dc.subject |
Military Science |
|
dc.subject |
U |
|
dc.title |
A Blueprint for Cyber Deterrence: Building Stability through Strength |
|
dc.type |
Article |
|