Alternatives to Cyber Warfare: Deterrence and Assurance
نویسندگان
چکیده
Deterrence as practiced during the Cold War was largely defined in terms of capabilities to impose punishment in response to an attack; however, with growing concern over the proliferation of cyber technologies, deterrence has evolved to be understood more generally in terms of cost/benefit calculi, viewed from not only a national perspective, but also recognizing the importance of both friendly and adversary perspectives. With this approach, the primary instruments used for deterrence are those which encourage restraint on the part of all affected parties. The use of a multiple lever approach to deterrence offers a path to an integrated strategy that not only addresses the cost/benefit calculus of the primary attacker, but also provides opportunities to influence the calculus of mercenary cyber armies for hire, patriotic hackers, or other groups. For this multiple lever approach to be effective a capability to assess the effects of cyber attacks on operations is needed. Such a capability based on multi-formalism modeling to model, analyze, and evaluate the effect of cyber exploits on the coordination in decision making organizations is presented. The focus is on the effect that cyber exploits, such as availability and integrity attacks, have on information sharing and task synchronization. Colored Petri Nets are used to model the decision makers in the organization and computer network models to represent their interactions. Two new measures of performance are then introduced: information consistency and synchronization. The approach and the computation of the measures of performance are illustrated though a simple example based on a variation of the Pacifica scenario. R. J. Elder ( ) · A. H. Levis · B. Yousefi System Architectures Laboratory, George Mason University, Fairfax, VA, USA e-mail: [email protected] A. H. Levis e-mail: [email protected] B. Yousefi e-mail: [email protected] © Springer International Publishing Switzerland 2015 15 S. Jajodia et al. (eds.), Cyber Warfare, Advances in Information Security 56, DOI 10.1007/978-3-319-14039-1_2 16 R. J. Elder et al. Fig. 2.1 Deter/Assure decision influences. (figure based on DO-JOC (2006))
منابع مشابه
Strategic Operations in the Cyber Domain and their Implications for National Cyber Security
With the public discussion mainly revolving around deterrence (either by denial or by punishment), there are actually a number of strategies which can be applied to cyber operations. A cyber strategy can be thought of as an umbrella for various individual cyber operations with the ultimate aim to achieve a strategic and / or political goal. Thus, cyber strategies can be defined as the developme...
متن کاملDeterrence of Cyber Attacks and U.S. National Security
This paper draws on deterrence theory to analyze the challenges that the United States faces in deterring cyber attacks. We begin by briefly reviewing the basic logic of deterrence theory and relating it to the challenge posed by cyber attacks. The following section explores what is commonly viewed as the key problem in deterring cyber attacks—the “attribution problem” arises when a state canno...
متن کاملCyber Warfare Simulation to Prepare to Control Cyber Space
ccurate simulation of cyber warfare can prepare decision-makers for its challenges. With cyber warfare, it is possible to control an adversaries’ information, target the portions of cyber space used for situational awareness and decision-making, lead the adversary to make desired decisions, and strike directly at the opposition’s mind. A cyber attack diminishes individual and group situational ...
متن کاملInformation Warfare in the Trenches
With the increased potential of a bona fide cyber terrorist attack and the possibility of a future “war in the wires”, we must continue to improve the education and training of individuals responsible for defending our national borders—whether those borders are physical or electronic. The Information Analysis and Research (IWAR) laboratory at the United States Military Academy (USMA) has proven...
متن کاملA Comprehensive Undergraduate Information Assurance Program
This paper describes the experience of our institution in creating a comprehensive undergraduate information assurance (IA) program. An interdisciplinary approach was undertaken in order to include a larger portion of the student body and faculty and thus influence a broader audience. The program includes a wide variety of mutually supporting information assurance activities including a researc...
متن کامل