Show simple item record

dc.contributor.advisorBlanken, Leo
dc.contributor.authorHemmer, Patrick T.
dc.dateMar-13
dc.date.accessioned2013-05-08T20:41:58Z
dc.date.available2013-05-08T20:41:58Z
dc.date.issued2013-03
dc.identifier.urihttp://hdl.handle.net/10945/32836
dc.descriptionApproved for public release; distribution is unlimiteden_US
dc.description.abstractRapid technological advancements and societal inclusion of these technologies have expanded civil and defense capabilities but have also created significant vulnerabilities. Cyber-weapons have the potential to affect interaction between states by exploiting this vulnerability. To better understand the mechanics of how cyber-weapons affect state relations this research applies a common framework to explore the attributes of traditional weaponsconventional, nuclear, and RMAand how they typically influence this behavior. After proposing selected factors that influence the effectiveness of a cyber-attack, the research examines the cyber-attacks in 2007 on Estonia and 2008 on Georgia in order to refine and provide nuanced analysis on the role of the proposed causal factors. The proposed factors are government involvement, level of attack sophistication, and the degree to which the state is dependent upon digitally connected technology. The research indicates that the role of the state is one of the most significant factors in influencing the effectiveness of a cyber-attack and highlights the role that plausible deniability plays in this relationship. Some initial policy recommendations are made based on the finding that the use of cyber-weapons as a deterrent is still ill-defined and that the focus should be on decreasing state vulnerability to these attacks.en_US
dc.description.urihttp://archive.org/details/deterrenceandcyb1094532836
dc.publisherMonterey, California. Naval Postgraduate Schoolen_US
dc.rightsThis publication is a work of the U.S. Government as defined
in Title 17, United States Code, Section 101. As such, it is in the
public domain, and under the provisions of Title 17, United States
Code, Section 105, is not copyrighted in the U.S.en_US
dc.titleDETERRENCE AND CYBER-WEAPONSen_US
dc.contributor.secondreaderRobinette, William
dc.contributor.departmentInformation Sciences (IS)
dc.subject.authorCyber-deterrenceen_US
dc.subject.authoroffensive cyber-attacksen_US
dc.subject.authorEstonian cyber-attacksen_US
dc.subject.authorGeorgian cyber-attacksen_US
dc.description.recognitionOutstanding Thesisen_US
dc.description.serviceMajor, United States Armyen_US
etd.thesisdegree.nameMaster Of Science In Information Systems And Operationsen_US
etd.thesisdegree.levelMastersen_US
etd.thesisdegree.disciplineInformation Systems And Operationsen_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record