Главная
Study mode:
on
1
Intro
2
How Useful Are Cyber Strategies
3
Megafauna Approach
4
The Problem
5
The Promise
6
Coercion
7
Cyber Coercion
8
Three Types of Cyber Operations
9
Major Findings
10
Country Specific Results
11
China
12
United States
13
Problems
Description:
Explore the evolving nature of cyber power and coercion in this 21-minute conference talk from USENIX Enigma 2018. Delve into a comprehensive analysis of cyber strategies' efficacy in the digital domain, presented by Brandon Valeriano, Donald Bren Chair of Armed Politics at Marine Corps University. Examine the theory that cyber operations function as a form of covert coercion, typically aimed at sending ambiguous signals or demonstrating resolve. Investigate various forms of cyber strategies through quantitative analysis, including cyber disruptions, short-term and long-term espionage, and degradation operations. Learn about the relationship between cyber operations and traditional coercive instruments such as diplomatic pressure, economic sanctions, and military threats. Gain insights into country-specific results, focusing on China and the United States, and understand the challenges associated with cyber strategies. Discover the implications for foreign policy responses to state-backed cyber intrusions and the development of international frameworks to constrain politically-motivated malware proliferation. Read more

Cyber Strategy - The Evolving Nature of Cyber Power and Coercion - USENIX Enigma 2018

USENIX Enigma Conference
Add to list