blog




  • Essay / Reanalyzing Cyber ​​Deterrence and Cyber ​​War - 1084

    Cyber ​​Deterrence and Cyber ​​War by Martin C. Libicki of RAND [1] was an interesting read but I noticed that it contains many short descriptions and theories view which can possibly lower the defensive level. and the offensive posture of any government, military or private sector industry that views opinion as a “de facto” source to be relied upon. My point of view comes from certain statements and assumptions made by the author. For example, Libicki says, “Cyberattacks are only possible because systems have flaws.” [1 pp 14] I don't know if this statement comes from the knowledge the author had at the time, or if this is what the author truly believed and/or believes at present. A computer system will always have some form of flaw, however, thinking that this is the only possibility of an attack being successful is also wrong. Rather than launching into a long discussion about the successes and failures of computer systems, I would like to point out the obvious: humans are often more imperfect than computers, programs and/or the code of these systems. An institution can create complex mechanisms and rules to secure systems to the Nth degree, but human error can cause repeated security failures of those systems. This was no more evident than in the cases of Bradley Manning [2] and Robert Hanssen [3 p. 28-33]. These two had access to classified and “air-gapped” systems [4]. Policies, controls and deterrents were put in place, but all failed, allowing the men to cause real damage. Although it is questionable whether Manning and Hanssen are relevant to the cyberwar debate, the relevance here comes from the erroneous assertion that "cyberattacks are only possible because systems have flaws." »...... middle of document ...... arfare. This was no more evident than in the Stuxnet infection that hit Iran [6] and in the Idaho National Labs demonstration that destroyed a generator. [7] Regardless, I will continue reading the book because it is an interesting read. Hopefully, thinkers can expand the scope of their cyberwarfare by using “outside the box” information. Works Cited[1] Cyberdeterrence and cyberwarfare / Martin C. Libicki. ISBN 978-0-8330-4734-2[2] http://en.wikipedia.org/wiki/Bradley_Manning[3] Wise, David (2003), Spy: The Inside Story of How the FBI's Robert Hanssen Betrayed America, Random House Publishers, ISBN 0375758941[4] http://en.wikipedia.org/wiki/Air_gap_%28networking%29[5] http://www.honeynet.org/node/157[6] http://en .wikipedia.org/wiki/Stuxnet[7] http://articles.cnn.com/2007-09-26/us/power.at.risk_1_generator-cyber-attack-electric-infrastructure?_s=PM:US