Jump to ContentJump to Main Navigation
Show Summary Details
More options …

Journal of Homeland Security and Emergency Management

Editor-in-Chief: Renda-Tanali, Irmak

Managing Editor: McGee, Sibel

IMPACT FACTOR 2018: 0.757

CiteScore 2018: 1.19

SCImago Journal Rank (SJR) 2018: 0.442
Source Normalized Impact per Paper (SNIP) 2018: 0.613

See all formats and pricing
More options …

Strategic Cyber Defense: Which Way Forward?

Kenneth Geers
Published Online: 2012-01-15 | DOI: https://doi.org/10.1515/1547-7355.1868

Cyber security has evolved from a technical discipline to a strategic, geopolitical concept. The question for national security thinkers today is not how to protect one or even a thousand computers, but millions, including the “cyberspace” around them. Strategic challenges require strategic solutions. This article considers four nation-state approaches to cyber attack mitigation: 1) Technology: Internet Protocol version 6 (IPv6); 2) Doctrine: Sun Tzu’s Art of War; 3) Deterrence: can we prevent cyber attacks?; 4) Arms control: can we limit cyber weapons? These threat mitigation strategies fall into different categories. IPv6 is a technical solution. Art of War is military. The third and fourth strategies are hybrid: deterrence is a mix of military and political considerations, while arms control is a political/technical approach. Technology and doctrine are the most likely strategies to provide short-term improvement in a nation’s cyber defense posture. Deterrence and arms control, which are more subject to outside political influence and current events, may offer cyber attack mitigation but only in the longer-term.

Keywords: cyber; doctrine; deterrence; arms control; IPv6

About the article

Published Online: 2012-01-15

Citation Information: Journal of Homeland Security and Emergency Management, Volume 9, Issue 1, Pages 1–10, ISSN (Online) 1547-7355, DOI: https://doi.org/10.1515/1547-7355.1868.

Export Citation

©2012 Walter de Gruyter GmbH & Co. KG, Berlin/Boston.Get Permission

Citing Articles

Here you can find all Crossref-listed publications in which this article is cited. If you would like to receive automatic email messages as soon as this article is cited in other publications, simply activate the “Citation Alert” on the top of this page.

Edward M. Roche
Netcom, 2019, Number 33-1/2
Jan Kallberg and Thomas S. Cook
IEEE Access, 2017, Volume 5, Page 8126

Comments (0)

Please log in or register to comment.
Log in