Effective institutions on the process of the creating deterrence power and preventing cyberthreats and cyberattack in the cyberdefence system

Document Type : Original Article

Authors

1 Doctoral Degree in Strategic Management of Cyberspace Security- (Corresponding Author)

2 Assistant Professor Tarbiat Modares University

3 Assistant Professor of Higher National Defense University

Abstract

Deterrence is one of the key discussions in the coutery’s security and defence. Hence, the promotion and development of strategic literature on deterrence and in particular on cybersecurity and cyberdefence in order to exploit responsible institutions for formulating and implementing cyberspace policies is one of the most important and urgent issues. Creating a valid deterrence power plays key role in cyber defence, to achieve this, the public, private and governmental institutions needed to carry out the main missions coordinately. In this research, based on Interpretive Structural Modelling (ISM) method, we intend to identify effective institutions on the process of creating the deterrence power and the prevention of threats and cyber attacks in the cyber defense system and examin which institutions at what level will take effecte from other institutions.
Finally, the results of the research show that all 14 cybersecurity organizations are effective on the process of creating deterrent power and preventing threats and cyber attacks, and are needed to achieve deterrence goals. In the second step, considering the effect of institutions on each other, based on the input and output of each entity, the level of influence of each entity is determined. Higher-level institutions have more influence over other institutions and have higher decision-making power and lower-level institutions are more dependent on other institutions.

Keywords


  • ·                     دهقانی، علی­اصغر، (1397)، بازدارندگی سایبری در امنیت نوین جهانی: تهدید سایبری روسیه و چین علیه زیرساخت های حیاتی آمریکا، رهیافت­های سیاسی و بین‌المللی.
  • ·                     دولت­آبادی باقری، علی، (1392)، نقش بازدارندگی در راهبرد نظامی ایران، مجله سیاست دفاعی، سال بیست و دوم، شماره 85، زمستان 1392، صفحات 37-87.
  • ·                     سازمان پدافند غیرعامل، (1393)، سند راهبردی پدافند سایبری کشور، ماهنامه پاپسا شماره اول، خردادماه.
  • ·                     ساوره­درودی، مصطفی؛ پوریانی، جابر، (1397)، امنیت سایبری در رژیم صهیونیستی.
  • ·                     قوانین کشور، (1394)، سیاست‌های کلی برنامه‌ی ششم، ابلاغ رهبری به رئیس‌جمهور، قوانین کشور.
  • ·                     ملائی، علی؛ کارگری، مهرداد؛ خراشادی­زاده، محمدرضا، (1397)، الگوی بازدارندگی در فضای سایبر بر اساس نظریه بازی­ها، فصلنامه امنیت ملی دانشگاه عالی دفاع ملی، صفحات 141-172.
  • ·                     ملائی، علی؛ محمدی، علی، (1392)، ارائه نظام رصد و پایش تهدیدات و حملات فضای سایبر با استفاده از معماری ISAC. فصلنامه نگرش امنیتی سال اول، شماره چهارم.
  • ·                     نایبی­پور، محمدرضا؛ خزائی، امید؛ حسینی، سیده­زهره، (1397)، دپارتمان مقابله با تهدیدات سایبری ایالات‌متحده آمریکا، تهران: انتشارات پشتیبان.
  • ·                     وحیدپور، حمید، (1392)، لازمه وجود توانمندی­های سایبری پدافندی و تهاجمی به عنوان عوامل بازدارندگی، Paper presented at the ششمین کنگره انجمن ژئوپلیتیک ایران پدافند غیرعامل مشهد.
  • ·                     راهبرد سایبری وزارت دفاع آمریکا (2018)

 https://media.defense.gov Retrieved from https://media.defense.gov/2018/Sep/18/2002041658/-1/-1/1/CYBER_STRATEGY_SUMMARY_FINAL.PDF

  • ·                     راهبرد سایبری وزارت دفاع آمریکا (2015)

https://archive.defense.gov: https://archive.defense.gov Retrieved from https://archive.defense.gov/home/features/2015/0415_cyber-strategy/final_2015_dod_cyber_strategy_for_web.pdf

  • Beidleman, Scott W. (2009). Defining and deterring cyber war. Retrieved from
  • Commonwealth of Australia, Department of the Prime Minister and Cabinet. (2016). AUSTRALIA’S CYBER SECURITY STRATEGY. Enabling innovation, growth & prosperity.
  • DIA_New_Zealand. (2014). Risk Assessment process information security. Internal Affairs New Zealand government. Te Tari Taiwhenua.
  • DOD_of_Belgian. (2014). Cyber Security Strategy for Defence. CST–Strategy-CyberSecurity-001 Ed 001 / Rev 000 2014/09/30:DEFENCE.Strategy Department.
  • DOD_OF_USA. (2011). Department of defense strategy for operating in cyberspace. Department of defense
  • FCR_Austria. (2013). Austrian Cyber Security Strategy. Federal Chancellery of the Republic of Austria.
  • Goodman, Will. (2010). Cyber deterrence: Tougher in theory than in practice? Retrieved from
  • Hausken, Kjell, & Zhuang, Jun. (2012). The timing and deterrence of terrorist attacks due to exogenous dynamics. Journal of the Operational Research Society, 63(6), 726-735.
  • HM-Government. (2016). National Cyber Security Strategy 2016-2021.
  • Jensen, Eric Talbot. (2012). Cyber Deterrence.
  • Kesan, Jay P, & Hayes, Carol M. (2011). Mitigative counterstriking: Self-defense and deterrence in cyberspace. Harv. JL & Tech. 25, 429.
  • Kugler, Richard L. (2009). Deterrence of cyber attacks. Cyberpower and national security, 320.
  • Liles, Jonathan S, & Davidson, Janine. (2013). Modern Cyber Deterrence Theory: Norms, Assumptions and Implications.
  • MOD_UK. (2011). The UK Cyber Security Strategy: Protecting and promoting the UK in a digital world. London: MOD UK: Ministry of Defence (United Kingdom).
  • Moore, Ryan J. (2008). Prospects for cyber deterrence. Retrieved from
  • Morgan, Patrick M. (2010). Applicability of Traditional Deterrence Concepts and Theory to the Cyber Realm. Paper presented at the Proceedings of a Workshop on Deterring Cyber Attacks: Informing Strategies and Developing Options for US Policy.
  • Mowbray, TJ. (2010). Solution architecture for cyber deterrence.
  • Patton, Michael Quinn. (2002). Qualitative Research & Evaluation Methods.
  • Payappalli, Vineet M, Zhuang, Jun, & Jose, Victor Richmond R. (2017). Deterrence and Risk Preferences in Sequential Attacker–Defender Games with Continuous Efforts. Risk Analysis.
  • Prime_Minister_of_France. (2015). FRENCH NatioNal digital security strategy. Courtesy translation. Foreword from Manuel Valls, Prime Minister of France, French national digital security strategy. Prime Minister of France.
  • Rosenzweig, Paul. (2010). The Organization of the United States Government and Private Sector for Achieving Cyber Deterrence. DETERRING CYBER ATTACKS: INFORMING STRATEGIES AND DEVELOPING OPTIONS FOR US POLICY, National Research Council, Forthcoming.
  • Taipale, KA. (2010). Cyber-deterrence. Law, Policy and Technology: Cyberterrorism, Information, Warfare, Digital and Internet Immobilization, IGI Global