Skip to main content

Cyber Deterrence Theory and Practise

  • Chapter
  • First Online:

Part of the book series: Intelligent Systems, Control and Automation: Science and Engineering ((ISCA,volume 93))

Abstract

This chapter evaluates the feasibility of cyber deterrence strategies. In the past few years, cyberspace has been the centre of attention for military policymakers, with states racing to assert their dominance and superiority. As with the advent of aerial warfare and air power in the first half of the twentieth century, the cyber domain has seen a rapid influx of technology. This praxis has outpaced theoretical formulation and conceptual development, with the result being that old strategies are being transposed to the new domain. Deterrence is chief among these but suffers from significant problems, as it has been fundamentally shaped by the nuclear era. The nature of cyberspace as characterised by immateriality and supranationality, with a preponderance of non-state actors, makes the rule sets that defined nuclear deterrence inapplicable. Exacerbating these issues are the real difficulties of achieving credibility and the attribution problem. The cyber deterrence strategies that have hereunto been expounded do not seem to heed these issues, but instead inflame a dangerous rhetoric that fuels a particularly volatile arms race. As an initial step towards ameliorating this situation, this chapter concludes by offering two rudimentary policy suggestions.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

Download references

Acknowledgements

This chapter was partly based on an unpublished essay written for the International Institute of Strategic Studies 2015 Student Essay Competition on International Cyber Security. The author was supported by the EPSRC and the UK government as part of the Centre for Doctoral Training in Cyber Security at Royal Holloway, University of London (EP/K035584/1).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Andreas Haggman .

Editor information

Editors and Affiliations

Appendix A: Historical UK Military Spending

Appendix A: Historical UK Military Spending

See Table 1.

Table 1 UK defence spending allocated per service branch 1920–1939 in £million. UK Public Spending Records. http://www.ukpublicspending.co.uk/

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG, part of Springer Nature

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Haggman, A. (2018). Cyber Deterrence Theory and Practise. In: Lehto, M., Neittaanmäki, P. (eds) Cyber Security: Power and Technology. Intelligent Systems, Control and Automation: Science and Engineering, vol 93. Springer, Cham. https://doi.org/10.1007/978-3-319-75307-2_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-75307-2_5

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-75306-5

  • Online ISBN: 978-3-319-75307-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics