Skip to product information
1 of 1

GEORGETOWN UNIVERSITY PRESS

Optimizing Cyberdeterrence

Optimizing Cyberdeterrence

A Comprehensive Strategy for Preventing Foreign Cyberattacks

ISBN: 9781626164130
We have 1 in stock

Regular price $56.22 AUD
Regular price $64.99 AUD Sale price $56.22 AUD
Sale Sold out
Taxes included. Shipping calculated at checkout.

Cyberattacks are one of the greatest fears for governments and the private sector. The attacks come without warning and can be extremely costly and embarrassing. Robert Mandel offers a unique and comprehensive strategic vision for how governments, in partnership with the private sector, can deter cyberattacks from both nonstate and state actors. Cyberdeterrence must be different from conventional military or nuclear deterrence, which are mainly based on dissuading an attack by forcing the aggressor to face unacceptable costs. In the cyber realm, where attributing a specific attack to a specific actor is extremely difficult, conventional deterrence principles are not enough. Mandel argues that cyberdeterrence must alter a potential attacker's decision calculus by not only raising costs for the attacker but also by limiting the prospects for gain. Cyberdeterrence must also involve indirect unorthodox restraints, such as exposure to negative blowback and deceptive diversionary measures, and cross-domain measures rather than just retaliation in kind. The book includes twelve twenty-first-century cyberattack case studies to draw insights into cyberdeterrence and determine the conditions under which it works most effectively. Mandel concludes by making recommendations for implementing cyberdeterrence and integrating it into broader national security policy. Cyber policy practitioners and scholars will gain valuable and current knowledge from this excellent study.

By Robert Mandel

Imprint: GEORGETOWN UNIVERSITY PRESS

Release Date:

Format: PAPERBACK

Pages: 302

Introduction 1. Foreign Cyberthreat Dangers 2. Cyberdeterrence Paradoxes 3. Obstacles to Forward Progress 4. Cyberattack Case Studies 5. Case Study Patterns 6. Improving Cyberdeterrence Planning 7. Improving Cyberdeterrence Execution 8. When Cyberdeterrence Works Best Conclusion BibliographyIndexAbout the Author

View full details

Author Bio