H2O

This is the old version of the H2O platform and is now read-only. This means you can view content but cannot create content. You can access the new platform at https://opencasebook.org. Thank you.

2.2.3 Difficulties Inherent to Cyber Domain

by Jack Goldsmith and a Berkman Center Cybersecurity Team Show/Hide
    1. 1.1 Show/Hide More David Clark and Susan Landau, Untangling Attribution, Proceedings of a Workshop on Deterring CyberAttacks: Informing Strategies and Developing Options for U.S. Policy, 2010.
      Attribution on the Internet can mean the owner of the machine, the physical location of the machine, or the individual who is actually responsible for the actions. This paper teases apart the attribution problems in order to determine under which circumstances which types of attribution would actually be useful.
    1. 2.1 Show/Hide More Martin C. Libicki, Cyberdeterrence and Cyberwar: Ch. 3: Why Cyberdeterrence is Different , RAND, 2009
      This chapter discusses cyberdeterrence and explains its profound difference from nuclear deterrence. It argues that because cyberspace is so different a medium, the concepts of deterrence and war may simply lack the logical foundations that they have in the nuclear and conventional realms.
    2. 2.2 Show/Hide More Kugler, Richard L., Cyberpower and National Security, Ch. 13: Deterrence of Cyber Attacks, eds. Kramer, Starr, and Wentz, 2009
      This chapter rejects the view that the “attribution problem” paralyzes any attempt to develop a cyber deterrence strategy. It focuses on cases in which an adversary will make itself known because a cyber threat is posed to advance a different political goal.
  1. 3 Show/Hide More 2.2.3.c Metrics
    Original Creator: Jack Goldsmith and a Berkman Center Cybersecurity Team
    In the absence of good cybersecurity metrics, it is largely impossible to quantify cost-benefit trade-offs in implementing security features. Even worse, it is very difficult if not impossible to determine if System A is more secure than System B.
    1. 3.1 Show/Hide More Seymour E. Goodman and Herbert S. Lin, Toward a Safer and More Secure Cyberspace, Ch. 6.3: Cybersecurity Metrics, National Research Council, 2007, pp. 133-142
      This section reviews various approaches to develop a cybersecurity metrics and concludes by calling for further research in the field.
    1. 4.1 Show/Hide More Misha Glenny, A Weapon We Can’t Control, NYTimes, Jun 25, 2012
      In this brief op-ed Glenny argues that the decision to deploy Stuxnet marked a dangerous turn in teh militarization of the Internet.
Close

Playlist Information

May 21, 2013

Author Stats

Jack Goldsmith and a Berkman Center Cybersecurity Team

Other Playlists by Jack Goldsmith and a Berkman Center Cybersecurity Team

Find Items

Search below to find items, then drag and drop items onto playlists you own. To add items to nested playlists, you must first expand those playlists.

SEARCH
Leitura Garamond Futura Verdana Proxima Nova Dagny Web
small medium large extra-large