Nothing New Under the Sun: Benefiting from the Great Lessons of History to Develop a Coherent Cyberspace Deterrence Strategy - Cyber War, WMD, Nuclear and Space Deterrence, Iraq, Cuban Missile Crisis Nothing New Under the Sun: Benefiting from the Great Lessons of History to Develop a Coherent Cyberspace Deterrence Strategy - Cyber War, WMD, Nuclear and Space Deterrence, Iraq, Cuban Missile Crisis

Nothing New Under the Sun: Benefiting from the Great Lessons of History to Develop a Coherent Cyberspace Deterrence Strategy - Cyber War, WMD, Nuclear and Space Deterrence, Iraq, Cuban Missile Crisis

    • $10.99
    • $10.99

Publisher Description

Professionally converted for accurate flowing-text e-book format reproduction, this study examines how the U.S. government can follow a path to an effective cyberspace deterrence strategy by examining key periods in its past, countering the contemporary hypothesis that the unique nature of cyberspace alters warfare in such a way that historical approaches to deterrence no longer apply. Today, existing threats in cyberspace are the most pressing and compelling test of our thinking and the ten principles of cyberspace deterrence gleaned from the historical analysis of warfighting set the foundation for a solution.

Thousands of cyberspace attacks occur each day and the likelihood of a significant incident in the near future is high. The development of a coherent cyberstrategy has been slow in coming, however. This delay often emanates from the perception that cyberspace represents such a pervasive revolution in the conduct of warfare that successful deterrence strategies of the past are not applicable. Currently, the benefits for committing malicious actions in cyberspace far outweigh the risk of punishment.

INTRODUCTION * The Fifth Domain * The Known * The Way Ahead * Research Approach * CHAPTER 1 * FOUNDATIONS * Cyberspace * Domain * Information Environment * Information Technology Infrastructures * Deterrence * Cyberspace Threats * Credible Threats * Cyber War * Strategic Guidance * National Security Strategy * The International Strategy for Cyberspace * Sustaining Global Leadership: Priorities for the 21st Century Defense * Quadrennial Defense Review * Department of Defense Strategy for Operating in Cyberspace * National Military Strategy * Blueprint for a Secure Cyber Future * CHAPTER 2 * HISTORY * Thinking in Time * Space Deterrence * Deterrence of Weapons of Mass Destruction (WMD) * Iraq * Libya * Iran * Nuclear Deterrence * The Cuban Missile Crisis * Military Deterrence * How is Cyberspace Different? * Attribution * Disarmament * Retaliation * Escalation * Targeting * Toward a Deterrence Strategy for Cyberspace * CHAPTER 3 * THE PRINCIPLES OF CYBERSPACE DETERRENCE * Deterrence Principles * Principle 1: Define the Domain * Principle 2: Defend the Domain * Principle 3: Destroy Threats to the Domain * Principle 4: Beware of Treaties * Principle 5: Establish Escalation Precedence * Principle 6: Ensure a Flexible Response * Principle 7: Institute a Collective Defense * Principle 8: Demilitarize Foreign Policy * Principle 9: Determine the Focus of the Deterrence Effort * Principle 10: Continually Incorporate History * CHAPTER 4 * RECOMMENDATIONS * Principles of Cyberspace Deterrence * Joint Doctrine Development * Developing and Communicating the Strategy * Legal Approval * Training and Exercises * Command and Control * CONCLUSION * BIBLIOGRAPHY

GENRE
Computing & Internet
RELEASED
2016
6 March
LANGUAGE
EN
English
LENGTH
486
Pages
PUBLISHER
Progressive Management
SELLER
Draft2Digital, LLC
SIZE
483.5
KB

More Books Like This

Total Army Cyber Mission Force (CMF): Reserve Component Integration - Buckshot Yankee Cyberspace Military Exercise, Mission Areas and Initiatives for Training, Development and Integration of RC Forces Total Army Cyber Mission Force (CMF): Reserve Component Integration - Buckshot Yankee Cyberspace Military Exercise, Mission Areas and Initiatives for Training, Development and Integration of RC Forces
2019
For the Common Defense of Cyberspace: Implications of a U.S. Cyber Militia on Department of Defense Cyber Operations - Is Threat Overblown, Privateers, Contractors, Legal Overview, Operating Concept For the Common Defense of Cyberspace: Implications of a U.S. Cyber Militia on Department of Defense Cyber Operations - Is Threat Overblown, Privateers, Contractors, Legal Overview, Operating Concept
2017
Blockchains in National Defense: Trustworthy Systems in a Trustless World - The Evolving Cyber Threat, Air Force Should Research and Develop Blockchain Technology to Reduce Probability of Compromise Blockchains in National Defense: Trustworthy Systems in a Trustless World - The Evolving Cyber Threat, Air Force Should Research and Develop Blockchain Technology to Reduce Probability of Compromise
2019
Cyber Conflict Cyber Conflict
2013
Cyberwar and Information Warfare Cyberwar and Information Warfare
2012
Information Warfare Information Warfare
2012

More Books by Progressive Management

21st Century U.S. Military Manuals: Sniper Training - FM 23-10 - Marksmanship, Equipment, Ballistics, Weapon Capabilities, Sniping Techniques (Value-Added Professional Format Series) 21st Century U.S. Military Manuals: Sniper Training - FM 23-10 - Marksmanship, Equipment, Ballistics, Weapon Capabilities, Sniping Techniques (Value-Added Professional Format Series)
2011
The Smell of Kerosene: A Test Pilot's Odyssey - NASA Research Pilot Stories, XB-70 Tragic Collision, M2-F1 Lifting Body, YF-12 Blackbird, Apollo LLRV Lunar Landing Research Vehicle (NASA SP-4108) The Smell of Kerosene: A Test Pilot's Odyssey - NASA Research Pilot Stories, XB-70 Tragic Collision, M2-F1 Lifting Body, YF-12 Blackbird, Apollo LLRV Lunar Landing Research Vehicle (NASA SP-4108)
2012
21st Century Essential Guide to U.S. Navy SEALs (Sea, Air, Land), Special Warfare Command, Special Operations Forces, Training, Weapons, Tactics, Dogs, Vehicles, History, bin Laden Killing 21st Century Essential Guide to U.S. Navy SEALs (Sea, Air, Land), Special Warfare Command, Special Operations Forces, Training, Weapons, Tactics, Dogs, Vehicles, History, bin Laden Killing
2011
2011 Complete Guide to IEDs: Improvised Explosive Devices: Enemy Tactics, Roadside Bombs, Counter-IED Targeting, Defeat the Device, Programs, Technologies, Afghanistan, Iraq, JIEDDO 2011 Complete Guide to IEDs: Improvised Explosive Devices: Enemy Tactics, Roadside Bombs, Counter-IED Targeting, Defeat the Device, Programs, Technologies, Afghanistan, Iraq, JIEDDO
2010
Federal Bureau of Investigation (FBI) Handbook of Forensic Services, 2007 Edition - Crime Scene Forensics and Criminal Evidence Collection and Handling Procedures Federal Bureau of Investigation (FBI) Handbook of Forensic Services, 2007 Edition - Crime Scene Forensics and Criminal Evidence Collection and Handling Procedures
2010
Apollo and America's Moon Landing Program: Apollo 11 Official NASA Mission Reports and Press Kit Apollo and America's Moon Landing Program: Apollo 11 Official NASA Mission Reports and Press Kit
2011