Editor-in-Chief: Renda-Tanali, Irmak, D.Sc.
Managing Editor: McGee, Sibel, Ph.D.
2 Issues per year
Increased IMPACT FACTOR 2011: 0.547
5-year IMPACT FACTOR: 0.568
Volume 10 (2013)
Volume 7 (2010)
Volume 6 (2009)
Volume 5 (2008)
Most Downloaded Articles
- Review of Building an Enterprise-Wide Business Continuity Program by Franklin, Charlotte
- Vulnerability of U.S. Cities to Environmental Hazards by Borden, Kevin A./ Schmidtlein, Mathew C./ Emrich, Christopher T./ Piegorsch, Walter W. and Cutter, Susan L.
- An Operational Framework for Resilience by Kahan, Jerome H./ Allen, Andrew C. and George, Justin K.
- Disaster Resilience Indicators for Benchmarking Baseline Conditions by Cutter, Susan L./ Burton, Christopher G. and Emrich, Christopher T.
- The Evolving Role of the Public Information Officer: An Examination of Social Media in Emergency Management by Hughes, Amanda L. and Palen, Leysia
Strategic Cyber Defense: Which Way Forward?
Citation Information: Journal of Homeland Security and Emergency Management. Volume 9, Issue 1, Pages 1–10, ISSN (Online) 1547-7355, DOI: 10.1515/1547-7355.1868, January 2012
- Published Online:
Cyber security has evolved from a technical discipline to a strategic, geopolitical concept. The question for national security thinkers today is not how to protect one or even a thousand computers, but millions, including the âcyberspaceâ around them. Strategic challenges require strategic solutions. This article considers four nation-state approaches to cyber attack mitigation: 1) Technology: Internet Protocol version 6 (IPv6); 2) Doctrine: Sun Tzuâs Art of War; 3) Deterrence: can we prevent cyber attacks?; 4) Arms control: can we limit cyber weapons? These threat mitigation strategies fall into different categories. IPv6 is a technical solution. Art of War is military. The third and fourth strategies are hybrid: deterrence is a mix of military and political considerations, while arms control is a political/technical approach. Technology and doctrine are the most likely strategies to provide short-term improvement in a nationâs cyber defense posture. Deterrence and arms control, which are more subject to outside political influence and current events, may offer cyber attack mitigation but only in the longer-term.