مقاله انگلیسی رایگان در مورد بازدارندگی: یک استراتژی معتبر برای فضای سایبری؟ – الزویر ۲۰۱۷

مقاله انگلیسی رایگان در مورد بازدارندگی: یک استراتژی معتبر برای فضای سایبری؟ – الزویر ۲۰۱۷

 

مشخصات مقاله
انتشار مقاله سال ۲۰۱۷
تعداد صفحات مقاله انگلیسی ۱۳ صفحه
هزینه دانلود مقاله انگلیسی رایگان میباشد.
منتشر شده در نشریه الزویر
نوع مقاله ISI
عنوان انگلیسی مقاله Deterrence is Not a Credible Strategy for Cyberspace
ترجمه عنوان مقاله بازدارندگی یک استراتژی معتبر برای فضای سایبری نیست
فرمت مقاله انگلیسی  PDF
رشته های مرتبط مهندسی کامپیوتر
گرایش های مرتبط امنیت اطلاعات
مجله Orbis
کد محصول E7452
وضعیت ترجمه مقاله  ترجمه آماده این مقاله موجود نمیباشد. میتوانید از طریق دکمه پایین سفارش دهید.
دانلود رایگان مقاله دانلود رایگان مقاله انگلیسی
سفارش ترجمه این مقاله سفارش ترجمه این مقاله

 

بخشی از متن مقاله:
The Uniqueness of Cyberspace

The cyberspace operational domain is defined as a global domain within the information environment comprising the interdependent network of information technology infrastructures and resident data, including the Internet, telecommunications networks, computer systems, and embedded processors and controllers.4 Thus, some experts argue that cyberspace is human-constructed and malleable. Moreover, the scope of this constantly shifting space is distinctive—state and non-state actors’ abilities to modify other operational domains cannot occur on the scale we are witnessing in cyberspace. Strategy must recognize that there is a qualitative difference between the capacity to modify terrain and the ability to create it whole cloth. The uniqueness of cyberspace is also reflected in the low cost of entry to this domain. Various actors can affect relative national power to operate in cyberspace that are orders of magnitude higher than the narrow club of great powers that operate with consequence in the land, air, maritime and space operational domains. Moreover, there is currently no internationally agreed upon concept of cyberspace sovereignty. This fact suggests a corollary—international relations (and nature) abhor vacuums. Consequently, cyber security strategy should assume that states and other significant actors continually are seeking to exert their influence in cyberspace through cyber operations, activities, and actions (OAAs). In addition, it is a domain in which all other operational domains and national instruments of power are enabled (if not dependent). And, given cyberspace’s interconnected nature, operations always involve contact, whether it is recognized or not. Furthermore, operations in cyberspace are unique because operators can manage attribution and design operations to generate a range of damage—reversible, temporary, or significant that is, nonetheless, short of internationally agreed upon definitions of use of force and armed attack. These characteristics should be appreciated in developing a strategy for cyberspace. Unfortunately, most of these characteristics are not considered when applying to cyberspace the strategic approach that has dominated U.S. policy— deterrence.

ثبت دیدگاه