2023
DOI: 10.1016/j.ejor.2022.07.021
|View full text |Cite
|
Sign up to set email alerts
|

Cyber deterrence with imperfect attribution and unverifiable signaling

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 14 publications
0
1
0
Order By: Relevance
“…31 Efforts to share information among defenders may lead to gains in efficiency and efficacy, both defensive and productive, but may also present cyber-specific downside risk, and hence trade-offs, depending on the form of the sharing. 32 Within the context of the cybersecurity of industrial supply chains, information-sharing could mean sharing cyber threat intelligence between defenders in the forms of vulnerability information or threat information, sharing or signaling defensive posture and offensive capability between attackers and defenders (see Welburn, Grana, and Schwindt, 2023, and the extended discussion in Appendix B), and sharing intellectual property (e.g., designs or specifications) between firms. Of particular concern are the possibilities of revealing information that an adversary can exploit to its advantage or of expanding the attacker's attack surface by conveying additional points of entry that increase the probability of successful attacks.…”
Section: Cyber-specific Concerns About Information and Visibilitymentioning
confidence: 99%
See 2 more Smart Citations
“…31 Efforts to share information among defenders may lead to gains in efficiency and efficacy, both defensive and productive, but may also present cyber-specific downside risk, and hence trade-offs, depending on the form of the sharing. 32 Within the context of the cybersecurity of industrial supply chains, information-sharing could mean sharing cyber threat intelligence between defenders in the forms of vulnerability information or threat information, sharing or signaling defensive posture and offensive capability between attackers and defenders (see Welburn, Grana, and Schwindt, 2023, and the extended discussion in Appendix B), and sharing intellectual property (e.g., designs or specifications) between firms. Of particular concern are the possibilities of revealing information that an adversary can exploit to its advantage or of expanding the attacker's attack surface by conveying additional points of entry that increase the probability of successful attacks.…”
Section: Cyber-specific Concerns About Information and Visibilitymentioning
confidence: 99%
“…34 However, even when detection and retaliation are possible, the literature suggests that deterrence strategies that either publicly name and shame or retaliate in kind may be effective, but only some of the time against some adversaries. For more on retaliation with imperfect detection and attribution, see, e.g., Edwards et al (2017) and Welburn, Grana, and Schwindt (2023). LaTourrette, 2015, andHaphuriwat, Bier, andWillis, 2011, respectively).…”
Section: Cyber-specific Concerns About Information and Visibilitymentioning
confidence: 99%
See 1 more Smart Citation
“…Information and data are among the most significant things that a hacker seeks to access in order to control the system and exploit customers. The cyber security system consists of three essential elements: Cyber force [6], cyber defence [7], and cyber deterrence [8]. The primary position of cybersecurity is to put in place mechanisms to defend the computer network, protect the electronic environment, and ensure the safe transfer of information between government institutions and agencies without the presence of unauthorized persons or malware software aimed at controlling and manipulating the system [9][10][11].…”
Section: Introductionmentioning
confidence: 99%