Strategic Cyber Deterrence
In writing this book, I owe much to professors Colin Gray, Beatrice Heuser, Chris Demchak, and Tom Bruneau for their insights on theoretical and conceptual issues. I also want to thank Dorothy Denning and Pablo Breuer for technical verification, Michael Schmitt and Anthony Glosson for legal validation, and also Richard Hoffman and John Feeley for historical perspective. My sincere appreciation...
Scott Jasper
Rowman & Littlefield Publishers
285
Strategic Cyber Deterrence
A2/AD
Scott Jasper
Rowman & Littlefield Publishers
323
Strategic Cyber Deterrence
Part I
Scott Jasper
Rowman & Littlefield Publishers
16
Strategic Cyber Deterrence
All sectors of the economy rely on the networks, systems, and services that form the integrated and interconnected global domain known as cyberspace. Information and communication technologies (ICTs) are, accordingly, essential to the defense sector, especially during the conduct of military operations. Yet protecting the cyber domain is challenging because it is currently boundary-free, subject to dynamic change, and open to all comers. Cyberspace is probed and penetrated by nation-states, hacker groups, criminal organizations, and terrorist groups. These entities, called malicious or threat actors, can be partially or wholly responsible for a cyber incident that impacts an organization’s...
Scott Jasper
Rowman & Littlefield Publishers
12,932
Strategic Cyber Deterrence
An attack in cyberspace is defined as “any kind of malicious activity that attempts to collect, disrupt, deny, degrade, or destroy information system resources or the...
Scott Jasper
Rowman & Littlefield Publishers
12,342
Strategic Cyber Deterrence
The Prussian philosopher-general Carl von Clausewitz wrote that “the primary purpose of any theory is to clarify concepts and ideas that have become, as it were, confused and entangled.”Carl von Clausewitz, On War, trans, Michael Howard and Peter Paret (Princeton, NJ: Princeton University Press,...
Scott Jasper
Rowman & Littlefield Publishers
11,543
Strategic Cyber Deterrence
Part II
Scott Jasper
Rowman & Littlefield Publishers
15
Strategic Cyber Deterrence
The strategy of deterrence by retaliation is based upon the threat to impose costs for hostile acts in cyberspace. Nations reserve the right to respond by all necessary means, often in kind, to an attack on their interests. Since deterrence is partially a function of perception, the strategic option of retaliation works by...
Scott Jasper
Rowman & Littlefield Publishers
12,134
Strategic Cyber Deterrence
The strategy of deterrence by denial of benefit from malicious activity in cyberspace seeks to convince any malicious actor their attacks will fail to achieve their desired outcome or simpler still, seeks to deny their success. The US Defense Department...
Scott Jasper
Rowman & Littlefield Publishers
11,522
Strategic Cyber Deterrence
The strategy of deterrence by entanglement presumes state cooperation on mutual interests encourages restraint to avoid unintended consequences and antagonizing third parties. Nations share political, economic, commercial, and strategic interdependence...
Scott Jasper
Rowman & Littlefield Publishers
11,878
Strategic Cyber Deterrence
Part III
Scott Jasper
Rowman & Littlefield Publishers
16
Strategic Cyber Deterrence
The strategy of active cyber defense is described as the real-time detection, analysis, and mitigation of network security breaches combined with the aggressive use of...
Scott Jasper
Rowman & Littlefield Publishers
11,761
Strategic Cyber Deterrence
For the deterrence of malicious...
Scott Jasper
Rowman & Littlefield Publishers
11,512
Strategic Cyber Deterrence
The general theory of strategy enables a nation to cope with serious challenges to national security. For the United States, the President declares that “significant malicious cyber-enabled activities originating from, or directed by persons...
Scott Jasper
Rowman & Littlefield Publishers
7,609
Strategic Cyber Deterrence
Scott Jasper
Rowman & Littlefield Publishers
4,277
Strategic Cyber Deterrence
Scott Jasper, CAPT, USN (ret.) is a faculty member in the National Security Affairs department and also teaches in the Center for Civil-Military Relations and the Center for Homeland Defense and Security all at the Naval Postgraduate School in Monterey, California. He designs and delivers resident and mobile courses on Cyber Security...
Scott Jasper
Rowman & Littlefield Publishers
183