Home Strategic Cyber Defense: Which Way Forward?
Article
Licensed
Unlicensed Requires Authentication

Strategic Cyber Defense: Which Way Forward?

  • Kenneth Geers
Published/Copyright: January 15, 2012

Cyber security has evolved from a technical discipline to a strategic, geopolitical concept. The question for national security thinkers today is not how to protect one or even a thousand computers, but millions, including the “cyberspace” around them. Strategic challenges require strategic solutions. This article considers four nation-state approaches to cyber attack mitigation: 1) Technology: Internet Protocol version 6 (IPv6); 2) Doctrine: Sun Tzu’s Art of War; 3) Deterrence: can we prevent cyber attacks?; 4) Arms control: can we limit cyber weapons? These threat mitigation strategies fall into different categories. IPv6 is a technical solution. Art of War is military. The third and fourth strategies are hybrid: deterrence is a mix of military and political considerations, while arms control is a political/technical approach. Technology and doctrine are the most likely strategies to provide short-term improvement in a nation’s cyber defense posture. Deterrence and arms control, which are more subject to outside political influence and current events, may offer cyber attack mitigation but only in the longer-term.

Published Online: 2012-1-15

©2012 Walter de Gruyter GmbH & Co. KG, Berlin/Boston

Articles in the same Issue

  1. Research Article
  2. Use of Small-Scale Test Data to Enhance Fire-Related Threat, Vulnerability, Consequence and Risk Assessment for Passenger Rail Vehicles
  3. Strategic Cyber Defense: Which Way Forward?
  4. Effect of a Marketing Program on Freshman Student Registration for an Emergency Notification System
  5. Strategic uses of Lessons for Building Collaborative Emergency Management System: Comparative Analysis of Hurricane Katrina and Hurricane Gustav Response Systems
  6. The Relationship between Turkey's Provinces' Development Levels and Social and Economic Vulnerability to Disasters
  7. A Review of the Key Legal dynamics of Chinese Military Involvement in Domestic Disaster Relief (MI/DDR)
  8. Testing Social Vulnerability Theory: A Quantitative Study of Hurricane Katrina's Perceived Impact on Residents living in FEMA Designated Disaster Areas
  9. If You Can't Trust, Stick to Hierarchy: Structure and Trust as Contingency Factors in Threat Assessment Contexts
  10. Regional Disaster Risk: Assessment and Mitigation Concepts in an All-Hazards Context
  11. Evacuation Patterns of Ethnic Groups Under Fire
  12. Risk Informed Decision Framework for Integrated Evaluation of Countermeasures against CBRN Threats
  13. The Influence of Politics on Federal Disaster Declaration Decision Delays
  14. Cross-Sectoral Scanning of Critical Infrastructures: from Functional Differences to Policy-Relevant Similarities
  15. Identifying Communication Strategies in Cases of Domestic Terrorism: Applying Cultural Context to the Fort Hood Shooting
  16. The Evolving Role of the Public Information Officer: An Examination of Social Media in Emergency Management
  17. Structural Dynamics of Organizations during the Evolution of Interorganizational Networks in Disaster Response
  18. Investigating the Roots of Crisis Management Studies and Outlining Future Trajectories for the Field
  19. The Multiplicity of Actors Involved in Securing America's Food Imports
  20. Homeland Security as International Security? The Case for International Relations as Disciplinary Model
  21. Challenges for Multi-sector Organizations in Tracking and Sheltering Registered Sex Offenders in Disasters
  22. Communicating H1N1 Risk to College Students: A Regional Cross-Sectional Survey Study
  23. Cultural Influence on the Implementation of Incident Command System for Emergency Management of Natural Disasters
  24. Influencing Factors of Emergency Information Spreading in Online Social Networks: A Simulation Approach
  25. Responding in Crises: A Comparative Analysis of Disaster Responses between Mainland China and Taiwan
  26. Updating the National Planning Scenarios: Using Wicked Problems and Capability-Based Planning Concepts for Homeland Security
  27. The 'Titanic Syndrome': Risk and Crisis Management on the Costa Concordia
  28. Book Reviews
  29. Review of Freedom and Order: How Democratic Governments Restrict Civil Liberties after Terrorist Attacks - and Why Sometimes They Don't
  30. Review of National Security Reform: How Commissions Can Drive Change During Crises
  31. Review of The Four Stages of Highly Effective Crisis Management
  32. Communication/News
  33. Public Health's Role in Understanding Community Resilience
  34. Identifying Factors that Influence Terrorist Decisions and Target Selection
  35. Opinion
  36. Emerging Dangers from Direct Botulinum Access and Use
  37. Failing to Establish a Unified Command in Louisiana During Hurricane Katrina
Downloaded on 8.9.2025 from https://www.degruyterbrill.com/document/doi/10.1515/1547-7355.1868/html
Scroll to top button