Deterring Cybertrespass And Securing Cyberspace: Lessons From United States Border Control Strategie

Deterring Cybertrespass And Securing Cyberspace: Lessons From United States Border Control Strategies

By Mary Manjikian

PRINT ON DEMAND— Shipping will be delayed 1-6 weeks for printing
(Depends on publisher)

In recent years, analysts have begun discussing strategies for securing entities in cyberspace-including the files and software belonging to corporations, government institutions, and private individuals. Increasingly, analysts have suggested utilizing two types of deterrence strategies: deterrence by denial and deterrence by punishment.

READ FULL DESCRIPTION

Quantity Price Discount
List Price $16.50  

Quick Quote

Lorem ipsum dolor sit amet, consectetur adipisicing elit

Non-returnable discount pricing

$16.50


Book Information

Publisher: Lulu.com
Publish Date: 02/08/2018
Pages: 84
ISBN-13: 9781387580972
ISBN-10: 1387580973
Language: English

Full Description

In recent years, analysts have begun discussing strategies for securing entities in cyberspace-including the files and software belonging to corporations, government institutions, and private individuals. Increasingly, analysts have suggested utilizing two types of deterrence strategies: deterrence by denial and deterrence by punishment. In determining how both deterrence strategies might be applied to preventing hostile individuals, states, and nonstate actors from entering cyberspace and inflicting damage there, analysts have borrowed from deterrence strategies that have been framed for a variety of other situations. While the tendency among members of the military community is to look to other military situations- such as nuclear war, or the use of biological or chemical weapons-in which deterrence strategies may have been used, it is my contention that these scenarios are not necessarily the best fit for describing what happens in cyberspace.

About the Author

Mary Manjikian is Professor and Associate Dean at the Robertson School of Government, Regent University, USA. Her work has appeared in International Studies Quarterly , International Feminist Journal of Politics, Intelligence and National Security and International Journal of Intelligence and Counterintelligence.

Learn More

We have updated our privacy policy. Click here to read our full policy.