Denmark’s Offensive Cyber Capabilities: Questionable Assets for Prestige, New Risks of Entrapment

نویسندگان

چکیده

In 2019, Denmark declared its military offensive cyber capability operational. This article analyses how this capacity compares to another recent acquisition, the F-35 multirole combat aircraft, in Denmark’s general security strategy. Snyder’s article, “The Security Dilemma Alliance Politics”, from 1984 explain why and strategic challenge for Danish decision-makers is minimize risk of abandonment by United States while avoiding becoming involuntarily entrapped U.S. conflicts (Snyder, 1984). has consciously sought balance dilemma since joining NATO 1949. shows that acquisition well suited strategy new functions differently, creating risks entrapment. While does not disqualify as a useful capability, it imply decision makers must evaluate on terms other than those conventional means.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Wireless Cyber Assets Discovery Visualization

As wireless networking has become near ubiquitous, the ability to discover, identify, and locate mobile cyber assets over time is becoming increasingly important to information security auditors, penetration testers, and network administrators. We describe a new prototype called MeerCAT (Mobile Cyber Asset Tracks) for visualizing wireless assets, including their location, security attributes, a...

متن کامل

Tools and Technologies for Professional Offensive Cyber Operations

Since 2008, several countries have published new national cyber security strategies that allow for the possibility of offensive cyber operations. Typically, national strategies call for the establishment of a cyber operations unit capable of computer network defence, exploitation, and, in some nations, attack. The cyber operations unit will be manned by professionals and operate under governmen...

متن کامل

Assessing the Risks of Cyber Terrorism, Cyber War and Other Cyber Threats

Cyber attacks, network security and information pose complex problems that reach into new areas for national security and public policy. This paper looks at one set of issues – those related to cyber-terrorism and cyber attacks on critical infrastructure and their implications for national security. Cyber-terrorism is “the use of computer network tools to shut down critical national infrastruct...

متن کامل

Predicting Cyber Risks through National Vulnerability Database

Su Zhang1, Xinming Ou2, and Doina Caragea3 1Cloud Platform Engineering, Symantec Corporation, Mountain View, California, USA 2Department of Computer Science and Engineering, University of South Florida, Tampa, Florida, USA 3Department of Computing and Information Sciences, Kansas State University, Manhattan, Kansas, USA ABSTRACT Software vulnerabilities are the major cause of cyber security pro...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Scandinavian Journal of Military Studies

سال: 2022

ISSN: ['2596-3856']

DOI: https://doi.org/10.31374/sjms.139