Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Cyber Strategy - The Evolving Nature of Cyber Power and Coercion - USENIX Enigma 2018

USENIX Enigma Conference via YouTube

Overview

Explore the evolving nature of cyber power and coercion in this 21-minute conference talk from USENIX Enigma 2018. Delve into a comprehensive analysis of cyber strategies' efficacy in the digital domain, presented by Brandon Valeriano, Donald Bren Chair of Armed Politics at Marine Corps University. Examine the theory that cyber operations function as a form of covert coercion, typically aimed at sending ambiguous signals or demonstrating resolve. Investigate various forms of cyber strategies through quantitative analysis, including cyber disruptions, short-term and long-term espionage, and degradation operations. Learn about the relationship between cyber operations and traditional coercive instruments such as diplomatic pressure, economic sanctions, and military threats. Gain insights into country-specific results, focusing on China and the United States, and understand the challenges associated with cyber strategies. Discover the implications for foreign policy responses to state-backed cyber intrusions and the development of international frameworks to constrain politically-motivated malware proliferation.

Syllabus

Intro
How Useful Are Cyber Strategies
Megafauna Approach
The Problem
The Promise
Coercion
Cyber Coercion
Three Types of Cyber Operations
Major Findings
Country Specific Results
China
United States
Problems

Taught by

USENIX Enigma Conference

Reviews

Start your review of Cyber Strategy - The Evolving Nature of Cyber Power and Coercion - USENIX Enigma 2018

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.