Technology 5 min read

Cyber-deterrence is the Future of Cybersecurity

Wk1003mike | Shutterstock.com

Wk1003mike | Shutterstock.com

Hackers pose a serious threat to countless targets in the modern world, which is why the Cybersecurity field exists. As hackers adapt to defenses, new methods need to be adopted to combat them. The number of cyber attacks has been rising in recent years, and experts may be turning to Cyber-deterrence in order to combat the rising tide of black hats.

The Internet has changed the world by allowing people to connect and communicate over vast distances in the blink of an eye, but this modern miracle has a flip side. As the world becomes more dependent on the internet, hackers are able to take advantage of more systems, including those of the most powerful countries in the world. This heralds the rise of the cyber security expert.

The cyber security field has an enormously difficult task ahead of them, and for the most part that task has been addressed by designing incredibly complex, passive defenses like firewalls and antivirus programs. Yet, some experts are considering a more active type of defense: Cyber-deterrence.

What is Cyber-deterrence?

The object of deterrence is to enable a counterattack and make attackers think twice in the first place. It works on two principles. First, you want to deny the enemy the ability to attack you by making it so difficult that they don’t even want to try. Second, if someone does attack, you want to be able to punish them badly enough to send a clear message to anyone else. Think of it as a razor-wire fence; you certainly don’t want to get cut by the razors, and if you got entangled within them you would be very vulnerable to counter-attack. In her article on deterrence, Dorothy Denning outlined how these two principles could be approached by the cyber security field.

The object of deterrence is to enable a counterattack and make attackers think twice in the first place.Click To Tweet

Denial is something that cyber defenses already focus on to an extent. A focus on deterrence would require stronger login security and better encryption. Developers and defense experts already focus on software updates and antivirus applications, but they will need to increase the efficiency in order to truly deter cyber attacks. For the most part, cyber defense is already aimed in this direction, but there are still holes to patch. For example, many devices have factory-default passwords which allow hackers to compromise those systems with ease.

According to Bruce Schneier, the markets favor cheap products, even if they are more unsecured because more security raises costs. This vulnerability contributed to the success of the Mirai botnet, which took over some big name targets such as Twitter. Shneier proposes government regulations that require manufacturers to impose basic security standards or be held accountable when their devices are employed in cyber attacks.

Punishment is the intimidating part of cyber-deterrence, as cyber defenses will be taking more active measures to mitigate hacking.  Active cyber defenses will scan their systems and block intruders, resembling air defense systems which scan the sky for targets and intercept incoming missiles. Additionally, cyber defenses could be honeypots, which act as decoys that redirect hackers into safe areas where they can be studied and possibly tracked.

Defenses that focus on cyber-deterrence, then, will reach back out to hackers instead of just trying to keep them out. This means that they could strip the anonymity that protects hackers from retaliation and legal action.

Differences Between Nuclear and Cyber Attack Deterrence

The private sector has to worry about the legal ramifications of active defense, and so far they haven’t been too keen on employing it for legal reasons. According to Denning, “the private sector is reluctant to employ many active defenses because of legal uncertainties.” Hackers are showing us that they can cause some major damage to computer systems around the world, making them comparable to weapons of mass destruction, and in that arena deterrence is the established policy. For example, nuclear deterrence has proven a successful model against nuclear attack.

Nuclear deterrence has taken the form of both denial and promised punishment for years, and it works. Only a few countries are capable of using nuclear weapons, and they are well known, making international regulatory bodies such as the International Atomic Energy Agency and treaties such as the Treaty on the Non-Proliferation of Nuclear Weapons possible.

By contrast, cyber security cannot follow the model of nuclear deterrence. Nuclear weapons are costly and require complex research, while cyber attacks can be designed and deployed fairly easily. Also, cyber attacks are mostly anonymous, unlike a nuclear attack where the attacker would most certainly be tracked. Due to the aforementioned reluctance of organizations to employ active defenses, there is little promise of punishment.

One factor that might make the private sector more willing to design and implement cyber-deterrence depends on the nations of the world. Countries will need to clarify and standardize regulations within their own nation as well as internationally, thus allowing new technologies to catch up with and even go after cyber attackers. If countries could set up international standards for cyber security, it could lead to more active defenses, and countries might become a bit more vigilant to avoid the shame of an international hacking incident.

Society will always have its criminals. As such, there is little chance of ridding the world of hackers. Yet, for every hacker there is a cyber security specialist looking to keep people safe from them. With any luck, cyber-deterrence will enable those specialists to keep our systems safe and secure.

First AI Web Content Optimization Platform Just for Writers

Found this article interesting?

Let William McKinney know how much you appreciate this article by clicking the heart icon and by sharing this article on social media.


Profile Image

William McKinney

William is an English teacher, a card carrying nerd, And he may run for president in 2020. #truefact #voteforedgy

Comment (1)
Most Recent most recent
You
  1. Profile Image
    Marvin Bastow March 02 at 9:54 am GMT

    Investment is one of the best ways to achieve financial freedom. For a beginner there are so many challenges you face. It’s hard to know how to get started. Trading on the Cryptocurrency market has really been a life changer for me. I almost gave up on crypto at some point not until saw a recommendation on Elon musk successfully success story and I got a proficient trader/broker Mr Bernie Doran , he gave me all the information required to succeed in trading. I made more profit than I could ever imagine. I’m not here to converse much but to share my testimony; I have made total returns of $10,500.00 from an investment of just $1000.00 within 1 week. Thanks to Mr Bernie I’m really grateful,I have been able to make a great returns trading with his signals and strategies .I urge anyone interested in INVESTMENT to take bold step in investing in the Cryptocurrency Market, he can also help you RECOVER your lost/stolen Cryptocurrencies. you can reach him on WhatsApp : + 1 (424) 285 – 0682 or his Gmail : BERNIEDORANSIGNALS @ GMAIL . COM bitcoin is taking over the world, tell him I referred you

1
share Scroll to top

Link Copied Successfully

Sign in

Sign in to access your personalized homepage, follow authors and topics you love, and clap for stories that matter to you.

Sign in with Google Sign in with Facebook

By using our site you agree to our privacy policy.