期刊文献+

美国"分层网络威慑战略"内容述评

A Review of the Content of U.S.Layered Cyber Deterrence Strategy
下载PDF
导出
摘要 美国为应对当前面对的网络安全治理难题和网络威慑战略实施困境,其网络空间日光浴委员发布了分层网络威慑战略报告.分层网络威慑战略涵盖了塑造行为、获益拒止和施加成本三个战略威慑层次.在借鉴过往网络威慑战略相关研究成果的基础上,分层网络威慑战略整合了多种威慑机制,融合了"向前防御"的战略理念,强调要加强公私部门协作以有效应对网络威胁,丰富和深化了传统的网络威慑战略理论. In response to the current cyber security governance problems and the plight of the deterrence strategy implementation, the Cyberspace Solarium Commission issued a layered network deterrence strategy report. The layered cyber deterrence strategy covers three levels of strategic deterrence: shaping behavior, denying benefit and imposing costs. Based on the previous research results of cyber deterrence strategy, the layered cyber deterrence strategy which enriches and deepens the traditional network deterrence theory integrates multiple deterrence mechanisms, incorporates the strategic concept of forward defense, and emphasizes the need to strengthen public-private collaboration to effectively respond to cyber threats.
作者 李艳 LI Yan(Beijing Electronic Science and Technology Institute,Beijing 100070,P.R.China)
出处 《北京电子科技学院学报》 2020年第4期56-61,共6页 Journal of Beijing Electronic Science And Technology Institute
关键词 美国分层网络威慑战略 战略体系 拒止型威慑 layered cyber deterrence in the U.S. strategic architecture deterrence by denial
  • 相关文献

参考文献4

二级参考文献45

  • 1"Cyber- Deterrence", Wired Magazine, September 1994, ht- tp ://www. wired, com/wired/archive/2.09/cyber, deter_pr, html.
  • 2:US Strategic Command, "Essentials of Post-Cold War Deterrence", 1995, http://www, nukestrat, com/us/stratcom/SAGesse-ntials. PDF.
  • 3US Department of Defense, "Deterrence Operations Joint Oper- ating Concept" , http://www, dtic. mil/futurejointwarfare/concepts/do_ joc_v2O, doe.
  • 4Jeffrey W. Knopf, " The Fourth Wave in Deterrence Re- search", Contemporary Security Policy, Vol. 31, No. 1, April 2010, pp. 1-33.
  • 5Matthew C. Waxmant, "Cyber-Attacks and the Use of Force: Back to the Future of Article 2 ( 4 ) ", The Yale Journal of International Law, Vol. 36, No. 2, 2011, pp. 421-459.
  • 6The White House, "International Strategy for Cyberspace : Pros- perity, Security, and Openness in a Networked World", May 2011, ht- tp ://www. whitehouse, gov/sites/default/files/rss_viewer/international_ strategy_for eyberspace, pdf.
  • 7Department of Defense, " Strategy for Operating in Cyber- space", July 2011, http ://timemilitary. files, wordpress, com/2011/07/ d20110714cyber, pdf.
  • 8Adam Segal, " Can U. S. Deter Cyber War?" January 12, 2012, http://thediplomat, com/flashpoints-blog/2012/01/12/can-u-s -deter-eyber-war/.
  • 9The Brookings Institution, "Deterrence in Cyberspace: Deba- ting the Right Strategy with Ralph Langner and Dmitri Alperovitch", Sep- tember 20, 2011, p. 12, http://www, brookings, edu//media/Files/ events/2011/0920_cyberdeterrence/20110920 cyber_defense, pdf.
  • 10The Brookings Institution, "Deterrence in Cyberspace: Deba- ting the Right Strategy with Ralph Langner and Dmitri Alperovitch", Sep- tember 20, 2011, p. 10, http ://www. brookings, edu//media/Files/ events/2011/O920_cyberdeterrence/20110920 cyber_defense, pdf.

共引文献23

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部