Deterring and Dissuading Cyberterrorism [Recurso electrónico] PDF

By: Klein, John JMaterial type: ArticleArticleSubject(s): Terrorismo -- Ciberterrorismo | Seguridad en las TecnologíasOnline resources: Click here to access online In: Journal of Strategic Security Journal of Strategic Security . -- Vol 8 No. 4 (Winter 2015) Art. 2Summary: Cyberterrorism, while being written about since the early 2000s, is still not fully understood as a strategic concept and whether such actions can be deterred is hotly contested. Some strategists and policy makers believe that acts of cyberterrorism, especially by non-state actors, may prove to be undeterrable. Yet the leadership of both state and non-state actors tend to act rationally and function strategically, and therefore they can, in fact, be deterred to some degree. Helping to shape the legitimate options following a significant cyberattack, the Law of Armed Conflict has salient considerations for the deterrence of cyberterrorism, particularly the principles of military necessity and lawful targeting. Furthermore, when considered holistically and using all available means, deterrence combined with dissuasion activities can lessen the likelihood of cyberterrorism, while mitigating any consequences should such a cyberattack actually occur.
Item type: Analíticas
Tags from this library: No tags from this library for this title. Log in to add tags.
    Average rating: 0.0 (0 votes)
Current library Collection Call number Status Date due Barcode Item holds
Centro de Análisis y Prospectiva de la Guardia Civil
Biblioteca Digital Available 2015972
Total holds: 0

Cyberterrorism, while being written about since the early 2000s, is still not fully understood as a strategic concept and whether such actions can be deterred is hotly contested. Some strategists and policy makers believe that acts of cyberterrorism, especially by non-state actors, may prove to be undeterrable. Yet the leadership of both state and non-state actors tend to act rationally and function strategically, and therefore they can, in fact, be deterred to some degree. Helping to shape the legitimate options following a significant cyberattack, the Law of Armed Conflict has salient considerations for the deterrence of cyberterrorism, particularly the principles of military necessity and lawful targeting. Furthermore, when considered holistically and using all available means, deterrence combined with dissuasion activities can lessen the likelihood of cyberterrorism, while mitigating any consequences should such a cyberattack actually occur.

There are no comments on this title.

to post a comment.
Koha-Kobli, © Ministerio de Educación, Cultura y Deporte España, 2013

Powered by Koha