Cyber Attacks, Attribution, and Deterrence: Case Studies – Stuxnet Attack on Iran, LulzSec, and Estonian Attacks, Protection of Cyberspace and Digital Infrastructure as Vital to National Security

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Cyber Attacks, Attribution, and Deterrence: Case Studies – Stuxnet Attack on Iran, LulzSec, and Estonian Attacks, Protection of Cyberspace and Digital Infrastructure as Vital to National Security by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9781370986781
Publisher: Progressive Management Publication: February 17, 2017
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9781370986781
Publisher: Progressive Management
Publication: February 17, 2017
Imprint: Smashwords Edition
Language: English

This excellent report has been professionally converted for accurate flowing-text e-book format reproduction. The purpose of this monograph is to examine the role of a defender's ability to attribute a cyber attack and its effect on deterrence. Conflict in cyberspace is constantly evolving and deterrence might provide stability and understanding of these conflicts. Because of the speed at which cyber attacks can occur and the rate at which they can spread, it is important to understand how countries using cyber weapons frame the problem.

The method used in this paper is controlled comparison of three different cyber attacks: the 2007 attacks on Estonia, the Stuxnet attack on Iran, and the LulzSec attacks multiple targets in 2011. These three events bore the similarity that defenders could not immediately attribute the attack to an actor. This attribution problem influenced how the defenders responded to the problem.
Upon further research, however, it became apparent that attribution was not the defenders' biggest problem in two of the three cases. Attribution may not always be immediately available through technical means, but eventually defenders had enough information on which to act. At this point, other problems arose, like escalating a cyber conflict with a far more powerful neighbor or determining how to respond without a cyber capability of one's own. These cases demonstrate attribution is a necessary but not sufficient cause for responding to a cyber attack and that defenders have many response options available, from technical defense of their networks to escalation of the conflict to kinetic military strikes.

Additionally, cyber deterrence does not require the high levels of attribution that some theorists argue. Instead, a counterattack can rely on a lower level of attribution because the target is typically a known adversary and because the results from a cyber attack are generally much lower than the effects from a kinetic attack. Thus, because of the need for a state to respond to cyber attacks in kind and the lower attribution requirements, an offensive cyber capability is both necessary and useful.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This excellent report has been professionally converted for accurate flowing-text e-book format reproduction. The purpose of this monograph is to examine the role of a defender's ability to attribute a cyber attack and its effect on deterrence. Conflict in cyberspace is constantly evolving and deterrence might provide stability and understanding of these conflicts. Because of the speed at which cyber attacks can occur and the rate at which they can spread, it is important to understand how countries using cyber weapons frame the problem.

The method used in this paper is controlled comparison of three different cyber attacks: the 2007 attacks on Estonia, the Stuxnet attack on Iran, and the LulzSec attacks multiple targets in 2011. These three events bore the similarity that defenders could not immediately attribute the attack to an actor. This attribution problem influenced how the defenders responded to the problem.
Upon further research, however, it became apparent that attribution was not the defenders' biggest problem in two of the three cases. Attribution may not always be immediately available through technical means, but eventually defenders had enough information on which to act. At this point, other problems arose, like escalating a cyber conflict with a far more powerful neighbor or determining how to respond without a cyber capability of one's own. These cases demonstrate attribution is a necessary but not sufficient cause for responding to a cyber attack and that defenders have many response options available, from technical defense of their networks to escalation of the conflict to kinetic military strikes.

Additionally, cyber deterrence does not require the high levels of attribution that some theorists argue. Instead, a counterattack can rely on a lower level of attribution because the target is typically a known adversary and because the results from a cyber attack are generally much lower than the effects from a kinetic attack. Thus, because of the need for a state to respond to cyber attacks in kind and the lower attribution requirements, an offensive cyber capability is both necessary and useful.

More books from Progressive Management

Cover of the book Culture, Identity and Information Technology in the 21st Century: Implications for U.S. National Security, the Future of English in Language Usage, Demographic Shifts by Progressive Management
Cover of the book U.S. Army Medical Correspondence Course: Waterfoods - Seafood, Fish and Shellfish, Aquaculture, Inspection, External Identification, Composition, Anatomy, Preservation, Deterioration by Progressive Management
Cover of the book Understanding and Managing North Korea's Nuclear Ambitions: DPRK Regime Survival, Use as Deterrence, Leverage, Prestige, Great Power Status, New Approaches to the Rogue State, Kim Family by Progressive Management
Cover of the book National Defense Intelligence College Paper: Intelligence Professionalism in the Americas - Mexico, Argentina, Brazil, Peru, Chile, Uruguay, Colombia, Bolivia, FARC, Russian Mafia, Submersibles by Progressive Management
Cover of the book The Effects of Nuclear War: Tutorial on a Nuclear Weapon over Detroit or Leningrad, Civil Defense, Attack Cases and Long-Term Effects, Economic Damage, Fictional Account, Radiological Exposure by Progressive Management
Cover of the book Improving the U.S. Military's Adaptability Against the Salafist-Jihadi Threat: Counterterrorism and COIN, Death-Terror Management Theory, Leader Decapitation Effect on Terrorist Organizations by Progressive Management
Cover of the book U.S. Army Medical Correspondence Course: Prescription Interpretation - Script Form, Common Latin Terms and Abbreviations by Progressive Management
Cover of the book "We Develop Missiles, Not Air!" The Legacy of Early Missile, Rocket, Instrumentation, and Aeromedical Research Development at Holloman Air Force Base, Project Manhigh by Progressive Management
Cover of the book Learning From the Enemy: The Gunman Project - Espionage at the Moscow U.S. Embassy, Soviet Spying, IBM Selectric Typewriter Bugs, Great Seal Implant by Progressive Management
Cover of the book Canine-Assisted Therapy in Military Medicine: Dogs and Human Mental Health, Wounded Warriors, Occupational Therapy, Combat Veterans, History of Army Dogs, PTSD, Nonmilitary Settings, Stress Control by Progressive Management
Cover of the book Global Positioning System (GPS) Systems Engineering Case Study - Technical Information and Program History of America's NAVSTAR Navigation Satellites by Progressive Management
Cover of the book Ideas, Concepts, Doctrine: Basic Thinking in the United States Air Force 1961-1984 - Volume Two, Air Power, Tactical Air Command, Air Mobility, Space, MOL, Manned Space Flight, Strategy by Progressive Management
Cover of the book Deconstructing Afghanistan: How Does America's Past Inform Afghanistan's Future? Taliban Political Reconciliation, Historical Comparison with American Civil War, Security and Economic Factors by Progressive Management
Cover of the book Nanoscience and Nanotechnology: A Review of Research in the Field of Nanorobotics - Biologically Inspired Nanorobots, Nanomanipulation, Nanosoldering, Nanotweezers by Progressive Management
Cover of the book Leadership and Parochialism: An Enduring Reality? Defense Reorganization, Bias in Praxis, Just Cause and Persian Gulf War, Colin Powell, Schwarzkopf, Jointness Attitudes by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy