2017 Cyber Attack Deterrence: Defense Science Board (DSB) Task Force on Cyber Deterrence – Developing Scalable Strategic Offensive Cyber Capabilities, Resilience of U.S. Nuclear Weapons, Attribution

Nonfiction, History, Military, Nuclear Warfare, Computers, Networking & Communications, Computer Security, Operating Systems
Cover of the book 2017 Cyber Attack Deterrence: Defense Science Board (DSB) Task Force on Cyber Deterrence – Developing Scalable Strategic Offensive Cyber Capabilities, Resilience of U.S. Nuclear Weapons, Attribution by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9781370190959
Publisher: Progressive Management Publication: March 6, 2017
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9781370190959
Publisher: Progressive Management
Publication: March 6, 2017
Imprint: Smashwords Edition
Language: English

This is a complete reproduction of the final report of the Defense Science Board Task Force on Cyber Deterrence released in late February 2017. The Task Force was asked to consider the requirements for deterrence of the full range of potential cyber attacks against the United States and U.S. allies/partners, and to identify critical capabilities (cyber and non-cyber) needed to support deterrence, warfighting, and escalation control against a highly cyber-capable adversary. Public interest in cyber deterrence has grown over the past several years as the United States has experienced a number of cyber attacks and costly cyber intrusions. However, it is essential to understand that cyber attacks on the United States to date do not represent the "high end" threats that could be conducted by U.S. adversaries today - let alone the much more daunting threats of cyber attacks and costly cyber intrusions that the Nation will face in coming years as adversary capabilities continue to grow rapidly. The Task Force determined the United States faces three distinct sets of cyber deterrence challenges.
First, major powers (e.g., Russia and China) have a significant and growing ability to hold U.S. critical infrastructure at risk via cyber attack, and an increasing potential to also use cyber to thwart U.S. military responses to any such attacks. This emerging situation threatens to place the United States in an untenable strategic position. Although progress is being made to reduce the pervasive cyber vulnerabilities of U.S. critical infrastructure, the unfortunate reality is that, for at least the next decade, the offensive cyber capabilities of our most capable adversaries are likely to far exceed the United States' ability to defend key critical infrastructures. The U.S. military itself has a deep and extensive dependence on information technology as well, creating a massive attack surface.

Second, regional powers (e.g., Iran and North Korea) have a growing potential to use indigenous or purchased cyber tools to conduct catastrophic attacks on U.S. critical infrastructure. The U.S. Government must work with the private sector to intensify efforts to defend and boost the cyber resilience of U.S. critical infrastructure in order to avoid allowing extensive vulnerability to these nations. It is no more palatable to allow the United States to be held hostage to catastrophic attack via cyber weapons by such actors than via nuclear weapons.

Third, a range of state and non-state actors have the capacity for persistent cyber attacks and costly cyber intrusions against the United States, which individually may be inconsequential (or be only one element of a broader campaign) but which cumulatively subject the Nation to a "death by 1,000 hacks."

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This is a complete reproduction of the final report of the Defense Science Board Task Force on Cyber Deterrence released in late February 2017. The Task Force was asked to consider the requirements for deterrence of the full range of potential cyber attacks against the United States and U.S. allies/partners, and to identify critical capabilities (cyber and non-cyber) needed to support deterrence, warfighting, and escalation control against a highly cyber-capable adversary. Public interest in cyber deterrence has grown over the past several years as the United States has experienced a number of cyber attacks and costly cyber intrusions. However, it is essential to understand that cyber attacks on the United States to date do not represent the "high end" threats that could be conducted by U.S. adversaries today - let alone the much more daunting threats of cyber attacks and costly cyber intrusions that the Nation will face in coming years as adversary capabilities continue to grow rapidly. The Task Force determined the United States faces three distinct sets of cyber deterrence challenges.
First, major powers (e.g., Russia and China) have a significant and growing ability to hold U.S. critical infrastructure at risk via cyber attack, and an increasing potential to also use cyber to thwart U.S. military responses to any such attacks. This emerging situation threatens to place the United States in an untenable strategic position. Although progress is being made to reduce the pervasive cyber vulnerabilities of U.S. critical infrastructure, the unfortunate reality is that, for at least the next decade, the offensive cyber capabilities of our most capable adversaries are likely to far exceed the United States' ability to defend key critical infrastructures. The U.S. military itself has a deep and extensive dependence on information technology as well, creating a massive attack surface.

Second, regional powers (e.g., Iran and North Korea) have a growing potential to use indigenous or purchased cyber tools to conduct catastrophic attacks on U.S. critical infrastructure. The U.S. Government must work with the private sector to intensify efforts to defend and boost the cyber resilience of U.S. critical infrastructure in order to avoid allowing extensive vulnerability to these nations. It is no more palatable to allow the United States to be held hostage to catastrophic attack via cyber weapons by such actors than via nuclear weapons.

Third, a range of state and non-state actors have the capacity for persistent cyber attacks and costly cyber intrusions against the United States, which individually may be inconsequential (or be only one element of a broader campaign) but which cumulatively subject the Nation to a "death by 1,000 hacks."

More books from Progressive Management

Cover of the book James Webb Space Telescope Independent Review Board Report May 2018: New 2021 Launch Date and Substantially Higher Costs for Next Great Astronomy Observatory, Findings of Human Errors by Progressive Management
Cover of the book Right Sizing the People's Liberation Army: Exploring the Contours of China's Military - Taiwan, Xinjiang, Uighurs, Tibet, Senkaku, Chinese Combat Aircraft, PLA Air Force, Naval Force, Nuclear by Progressive Management
Cover of the book The 2005 Iraqi Sunni Awakening: The Role of the Desert Protectors Program - Iraq War and Operation Iraqi Freedom, Anbar, Al Sahawa, Albu-Nimr Tribe in Hit, al-Qaeda Terrorism, Al Qaim, Sheikh Sattar by Progressive Management
Cover of the book Reflections of a Middling Cold Warrior: Should the Army Air Corps Be Resurrected? The Case for an Autonomous Air Force, World War II, Nuclear Weapons, Aviation Technologies, Personalities, Cultures by Progressive Management
Cover of the book Air Force Combat Units of World War II: Traces the Historical Lineage of Each Army Air Corps and U.S. Air Force Combat Group Active in the Second World War by Progressive Management
Cover of the book National Defense Intelligence College Paper: Sensemaking - A Structure for an Intelligence Revolution, Mindfulness, Macrocognition, Tame and Wicked Problems, Meliorists, Neuroscience by Progressive Management
Cover of the book The Unauthorized Movement of Nuclear Weapons and Mistaken Shipment of Classified Missile Components: An Assessment - USSTRATCOM, Root Cause Analysis, Doom 99 B-52 Mission, McPeak, Rumsfeld by Progressive Management
Cover of the book 21st Century Adult Cancer Sourcebook: Thymoma and Thymic Carcinoma - Clinical Data for Patients, Families, and Physicians by Progressive Management
Cover of the book Malaysia in Perspective: Orientation Guide and Malay Cultural Orientation: Anwar Ibrahim, History Timeline, Politics and Government, Economy, Society, Security, Religion, Traditions by Progressive Management
Cover of the book Russia After Putin: Ukraine, Syria, Relations with China, Beslan, Armenia, Stalin Lite, Magnitsky Scandal, Lavrov, Navalny, Russian Street Protests, European Union by Progressive Management
Cover of the book Culture Wars: Air Force Culture and Civil - Military Relations - USAF History on Dealing with National Policy, Case Studies of Operation Desert Storm and Northern/Southern Watch, Decade of Quasi-War by Progressive Management
Cover of the book Guilt-Free War: Post-Traumatic Stress Disorder (PTSD) and an Ethical Framework for Battlefield Decisions - Moral Injury, Guilt, Shame, Anger, Psychologist and Chaplain, Shell Shock, Combat Fatigue by Progressive Management
Cover of the book U.S. Army Medical Correspondence Course: Poultry II, Chicken, Turkey, Ducks, Geese, Inspection, Identification Marks, Class and Quality, Grade and Rating by Progressive Management
Cover of the book Are Muslim Diaspora in the U.S. Vulnerable to Islamic Extremism? Four Terrorist Case Studies, Boston Bombers Tsarnaev, Analysis of Role of Governance, Economics, Religion, U.S. Homeland Involvement by Progressive Management
Cover of the book 21st Century Peacekeeping and Stability Operations Institute (PKSOI) Papers - Protection of Civilians - Military Reference Guide - PoC Dynamics, Intelligence, Rule of Law, Patrols, Unrest by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy