CYBER WEAPONS AND DETERRENCE
dc.contributor.advisor | Rowe, Neil C. | |
dc.contributor.author | Wanic, Elizabeth E. | |
dc.date.accessioned | 2018-10-26T19:20:51Z | |
dc.date.available | 2018-10-26T19:20:51Z | |
dc.date.issued | 2018-09 | |
dc.identifier.uri | https://hdl.handle.net/10945/60361 | |
dc.description.abstract | With the increasing frequency of cyberattacks, there has been growing discussion on whether these actions can be deterred, and if so, how it can be accomplished. At the same time, there is a lack of international agreement on norms and standards for the use and development of cyber weapons. This thesis examines existing deterrence theory and addresses ts applicability in cyberspace. It describes differences between cyber weapons and conventional weapons and outlines the implications these differences can have on the effectiveness of cyber weapons as a deterrent. Expected outcomes of the cyber operation actions taken by the United States and its adversaries, including Russia, China, Iran, and North Korea, are highlighted. Possible actions with a potential deterrence effect are discussed, including stockpiling cyber weapons, using deception, imposing sanctions, creating international agreements, retaliating with conventional weapons, improving defenses, developing automated counterattack mechanisms, and mounting offensive cyber actions. The effectiveness of these actions as deterrents to adversaries and recommendations for U.S. policy are made. | en_US |
dc.description.uri | http://archive.org/details/cyberweaponsandd1094560361 | |
dc.publisher | Monterey, CA; Naval Postgraduate School | en_US |
dc.rights | Copyright is reserved by the copyright owner. | en_US |
dc.title | CYBER WEAPONS AND DETERRENCE | en_US |
dc.type | Thesis | en_US |
dc.contributor.secondreader | Denning, Dorothy E. | |
dc.contributor.secondreader | Maness, Ryan | |
dc.contributor.department | Computer Science (CS) | |
dc.subject.author | cyber weapons | en_US |
dc.subject.author | cyber deterrence | en_US |
dc.subject.author | policy | en_US |
dc.subject.author | cyber norms | en_US |
dc.description.service | Civilian | en_US |
etd.thesisdegree.name | Master of Science in Computer Science | en_US |
etd.thesisdegree.level | Masters | en_US |
etd.thesisdegree.discipline | Computer Science | en_US |
etd.thesisdegree.grantor | Naval Postgraduate School | en_US |
dc.identifier.thesisid | 30080 | |
dc.description.distributionstatement | Approved for public release; distribution is unlimited. |
Files in this item
This item appears in the following Collection(s)
-
1. Thesis and Dissertation Collection, all items
Publicly releasable NPS Theses, Dissertations, MBA Professional Reports, Joint Applied Projects, Systems Engineering Project Reports and other NPS degree-earning written works.