Cyber Strategy - The Evolving Nature of Cyber Power and Coercion - USENIX Enigma 2018
USENIX Enigma Conference via YouTube
Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the evolving nature of cyber power and coercion in this 21-minute conference talk from USENIX Enigma 2018. Delve into a comprehensive analysis of cyber strategies' efficacy in the digital domain, presented by Brandon Valeriano, Donald Bren Chair of Armed Politics at Marine Corps University. Examine the theory that cyber operations function as a form of covert coercion, typically aimed at sending ambiguous signals or demonstrating resolve. Investigate various forms of cyber strategies through quantitative analysis, including cyber disruptions, short-term and long-term espionage, and degradation operations. Learn about the relationship between cyber operations and traditional coercive instruments such as diplomatic pressure, economic sanctions, and military threats. Gain insights into country-specific results, focusing on China and the United States, and understand the challenges associated with cyber strategies. Discover the implications for foreign policy responses to state-backed cyber intrusions and the development of international frameworks to constrain politically-motivated malware proliferation.
Syllabus
Intro
How Useful Are Cyber Strategies
Megafauna Approach
The Problem
The Promise
Coercion
Cyber Coercion
Three Types of Cyber Operations
Major Findings
Country Specific Results
China
United States
Problems
Taught by
USENIX Enigma Conference