Denmark’s Offensive Cyber Capabilities: Questionable Assets for Prestige, New Risks of Entrapment
نویسندگان
چکیده
In 2019, Denmark declared its military offensive cyber capability operational. This article analyses how this capacity compares to another recent acquisition, the F-35 multirole combat aircraft, in Denmark’s general security strategy. Snyder’s article, “The Security Dilemma Alliance Politics”, from 1984 explain why and strategic challenge for Danish decision-makers is minimize risk of abandonment by United States while avoiding becoming involuntarily entrapped U.S. conflicts (Snyder, 1984). has consciously sought balance dilemma since joining NATO 1949. shows that acquisition well suited strategy new functions differently, creating risks entrapment. While does not disqualify as a useful capability, it imply decision makers must evaluate on terms other than those conventional means.
منابع مشابه
Wireless Cyber Assets Discovery Visualization
As wireless networking has become near ubiquitous, the ability to discover, identify, and locate mobile cyber assets over time is becoming increasingly important to information security auditors, penetration testers, and network administrators. We describe a new prototype called MeerCAT (Mobile Cyber Asset Tracks) for visualizing wireless assets, including their location, security attributes, a...
متن کاملTools and Technologies for Professional Offensive Cyber Operations
Since 2008, several countries have published new national cyber security strategies that allow for the possibility of offensive cyber operations. Typically, national strategies call for the establishment of a cyber operations unit capable of computer network defence, exploitation, and, in some nations, attack. The cyber operations unit will be manned by professionals and operate under governmen...
متن کاملAssessing the Risks of Cyber Terrorism, Cyber War and Other Cyber Threats
Cyber attacks, network security and information pose complex problems that reach into new areas for national security and public policy. This paper looks at one set of issues – those related to cyber-terrorism and cyber attacks on critical infrastructure and their implications for national security. Cyber-terrorism is “the use of computer network tools to shut down critical national infrastruct...
متن کاملPredicting Cyber Risks through National Vulnerability Database
Su Zhang1, Xinming Ou2, and Doina Caragea3 1Cloud Platform Engineering, Symantec Corporation, Mountain View, California, USA 2Department of Computer Science and Engineering, University of South Florida, Tampa, Florida, USA 3Department of Computing and Information Sciences, Kansas State University, Manhattan, Kansas, USA ABSTRACT Software vulnerabilities are the major cause of cyber security pro...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Scandinavian Journal of Military Studies
سال: 2022
ISSN: ['2596-3856']
DOI: https://doi.org/10.31374/sjms.139