menu
{ "item_title" : "Flexible Options for Cyber Deterrence", "item_author" : [" Frank W. Simcox "], "item_description" : "The idea of deterrence has existed since the beginning of humanity. The concept of deterrence became synonymous with American Cold War strategic thinking and foreign policy through the idea of mutually assured destruction. However, deterrence through punishment requires attribution, the demonstration of offensive capabilities, and an assumption of rationality. These requirements demonstrate the fallacy of Cold War deterrence applied to the cyber domain. In order to address both asymmetric threats from terrorists and the intimidation associated with nation-state peer competitors in the cyber domain, what is required is a comprehension of the challenges associated with attribution and international law. Just as important is an understanding of how extremists and nation-states use the cyber domain to conduct operations. Only then can the United States consider flexible cyber deterrent options within cyberspace.", "item_img_path" : "https://covers2.booksamillion.com/covers/bam/1/28/822/925/1288229259_b.jpg", "price_data" : { "retail_price" : "57.95", "online_price" : "57.95", "our_price" : "57.95", "club_price" : "57.95", "savings_pct" : "0", "savings_amt" : "0.00", "club_savings_pct" : "0", "club_savings_amt" : "0.00", "discount_pct" : "10", "store_price" : "" } }
Flexible Options for Cyber Deterrence|Frank W. Simcox

Flexible Options for Cyber Deterrence

local_shippingShip to Me
On Order. Usually ships in 2-4 weeks
FREE Shipping for Club Members help

Overview

The idea of deterrence has existed since the beginning of humanity. The concept of deterrence became synonymous with American Cold War strategic thinking and foreign policy through the idea of mutually assured destruction. However, deterrence through punishment requires attribution, the demonstration of offensive capabilities, and an assumption of rationality. These requirements demonstrate the fallacy of Cold War deterrence applied to the cyber domain. In order to address both asymmetric threats from terrorists and the intimidation associated with nation-state peer competitors in the cyber domain, what is required is a comprehension of the challenges associated with attribution and international law. Just as important is an understanding of how extremists and nation-states use the cyber domain to conduct operations. Only then can the United States consider flexible cyber deterrent options within cyberspace.

This item is Non-Returnable

Details

  • ISBN-13: 9781288229253
  • ISBN-10: 1288229259
  • Publisher: Biblioscholar
  • Publish Date: October 2012
  • Dimensions: 9.69 x 7.44 x 0.1 inches
  • Shipping Weight: 0.24 pounds
  • Page Count: 50

Related Categories

You May Also Like...

    1

BAM Customer Reviews