Close Menu
  • Homepage
  • News
  • Cloud & AI
  • ECommerce
  • Entertainment
  • Finance
  • Opinion
  • Podcast
  • Contact

Subscribe to Updates

Get the latest technology news from TechFinancials News about FinTech, Tech, Business, Telecoms and Connected Life.

What's Hot

R66 Million Transnet Fraud: Yakub Ahmed Suleman Bhikhu Setenced To 10 Years In Prison

2025-07-18

Dr Naledi Pandor Calls For “Good Trouble” On Nelson Mandela International Day

2025-07-18

PariPesa South Africa: Online Casino And A Sportsbook Combined In One App

2025-07-18
Facebook X (Twitter) Instagram
Trending
  • R66 Million Transnet Fraud: Yakub Ahmed Suleman Bhikhu Setenced To 10 Years In Prison
Facebook X (Twitter) Instagram YouTube LinkedIn WhatsApp RSS
TechFinancials
  • Homepage
  • News
  • Cloud & AI
  • ECommerce
  • Entertainment
  • Finance
  • Opinion
  • Podcast
  • Contact
TechFinancials
Home»Opinion»Cybersecurity’s Next Phase: Cyber-deterrence
Opinion

Cybersecurity’s Next Phase: Cyber-deterrence

Gugu LourieBy Gugu Lourie2016-12-14No Comments6 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Cyberattackers pose many threats to a wide range of targets. Russia, for example, was accused of hacking Democratic Party computers throughout the year, interfering with the U.S. presidential election. Then there was the unknown attacker who, on a single October day, used thousands of internet-connected devices, such as digital video recorders and cameras compromised by Mirai malware, to take down several high-profile websites, including Twitter. By Dorothy Denning

From 2005 to 2015, federal agencies reported a 1,300 percent jump in cybersecurity incidents. Clearly, we need better ways of addressing this broad category of threats. Some of us in the cybersecurity field are asking whether cyber deterrence might help.

Deterrence focuses on making potential adversaries think twice about attacking, forcing them to consider the costs of doing so, as well as the consequences that might come from a counterattack. There are two main principles of deterrence. The first, denial, involves convincing would-be attackers that they won’t succeed, at least without enormous effort and cost beyond what they are willing to invest. The second is punishment: Making sure the adversaries know there will be a strong response that might inflict more harm than they are willing to bear.

For decades, deterrence has effectively countered the threat of nuclear weapons. Can we achieve similar results against cyber weapons?

Why cyber deterrence is hard

Nuclear deterrence works because few countries have nuclear weapons or the significant resources needed to invest in them. Those that do have them recognize that launching a first strike risks a devastating nuclear response. Further, the international community has established institutions, such as the International Atomic Energy Agency, and agreements, such as the Treaty on the Non-Proliferation of Nuclear Weapons, to counter the catastrophic threat nuclear weapons pose.

Cyber weapons are nothing like nuclear ones. They are readily developed and deployed by individuals and small groups as well as states. They are easily replicated and distributed across networks, rendering impossible the hope of anything that might be called “cyber nonproliferation.” Cyber weapons are often deployed under a cloak of anonymity, making it difficult to figure out who is really responsible. And cyberattacks can achieve a broad range of effects, most of which are disruptive and costly, but not catastrophic.

This does not mean cyber deterrence is doomed to failure. The sheer scale of cyberattacks demands that we do better to defend against them.

There are three things we can do to strengthen cyber deterrence: Improve cybersecurity, employ active defenses and establish international norms for cyberspace. The first two of these measures will significantly improve our cyber defenses so that even if an attack is not deterred, it will not succeed.

Stepping up protection

Cybersecurity aids deterrence primarily through the principle of denial. It stops attacks before they can achieve their goals. This includes beefing up login security, encrypting data and communications, fighting viruses and other malware, and keeping software updated to patch weaknesses when they’re found.

But even more important is developing products that have few if any security vulnerabilities when they are shipped and installed. The Mirai botnet, capable of generating massive data floods that overload internet servers, takes over devices that have gaping security holes, including default passwords hardcoded into firmware that users can’t change. While some companies such as Microsoft invest heavily in product security, others, including many Internet-of-Things vendors, do not.

Cybersecurity guru Bruce Schneier aptly characterizes the prevalence of insecure Internet-of-Things devices as a market failure akin to pollution. Simply put, the market favors cheap insecure devices over ones that are more costly but secure. His solution? Regulation, either by imposing basic security standards on manufacturers, or by holding them liable when their products are used in attacks.

Active defenses

When it comes to taking action against attackers, there are many ways to monitor, identify and counter adversary cyberattacks. These active cyber defenses are similar to air defense systems that monitor the sky for hostile aircraft and shoot down incoming missiles. Network monitors that watch for and block (“shoot down”) hostile packets are one example, as are honeypots that attract or deflect adversary packets into safe areas. There, they do not harm the targeted network, and can even be studied to reveal attackers’ techniques.

Another set of active defenses involves collecting, analyzing and sharing information about potential threats so that network operators can respond to the latest developments. For example, operators could regularly scan their systems looking for devices vulnerable to or compromised by the Mirai botnet or other malware. If they found some, they could disconnect the devices from the network and alert the devices’ owners to the danger.

Active cyber defense does more than just deny attackers opportunities. It can often unmask the people behind them, leading to punishment. Nongovernment attackers can be shut down, arrested and prosecuted; countries conducting or supporting cyberwarfare can be sanctioned by the international community.

Currently, however, the private sector is reluctant to employ many active defenses because of legal uncertainties. The Center for Cyber and Homeland Security at George Washington University recommends several actions that the government and the private sector could take to enable more widespread use of active defenses, including clarifying regulations.

Setting international norms

Finally, international norms for cyberspace can aid deterrence if national governments believe they would be named and shamed within the international community for conducting a cyberattack. The U.S. brought charges in 2014 against five Chinese military hackers for targeting American companies. A year later, the U.S. and China agreed to not steal and exploit each other’s corporate secrets for commercial advantage. In the wake of those events, cyber espionage from China plummeted.

Also in 2015, a U.N. group of experts recommended banning cyberattacks against critical infrastructure, including a country’s computer emergency response teams. And later that year, the G20 issued a statement opposing the theft of intellectual property to benefit commercial entities. These norms might deter governments from conducting such attacks.

Cyberspace will never be immune to attack – no more than our streets will be immune to crime. But with stronger cybersecurity, increased use of active cyber defenses, and international cyber norms, we can hope to at least keep a lid on the problem.

  • The ConversationDorothy Denning, Distinguished Professor of Defense Analysis, Naval Postgraduate School
  • This article was originally published on The Conversation. Read the original article.

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Gugu Lourie

Related Posts

As Agentic AI Reshapes The Workforce, Businesses Must Proactively Redeploy Talent

2025-07-17

How SA’s BFSI Industries Are Seizing The GenAI Opportunity

2025-07-10

Your Data Privacy Is Slipping Away – Here’s Why And What You Can Do About It

2025-07-09

Social Media Can Support Or Undermine Democracy – It Comes Down To How It’s Designed

2025-07-07

Act Now And Stop Illicit Alcohol Rise With Collective Action

2025-07-07

Partnership Delivers Progress, But Energy Reforms Need Acceleration

2025-07-07

Internet Access: A Basic Need, Not A Luxury

2025-07-02

South Africa’s SIM Card Crisis Is Also A Plastic One 

2025-07-01

Youth Skills Are South Africa’s Competitive Edge In A Global Economy

2025-06-30
Leave A Reply Cancel Reply

DON'T MISS
Breaking News

R66 Million Transnet Fraud: Yakub Ahmed Suleman Bhikhu Setenced To 10 Years In Prison

Businessman Yakub Ahmed Suleman Bhikhu, who evaded arrest for six years, has been sentenced to…

Volvo Is Opening A Full-Service Dealership In Gqeberha’s Moffett Retail Park

2025-07-17

Rise In E-Commerce Activity Boosts SA’s Supply Chain Sector

2025-07-16

South Africans Spent R20M Via Luno Pay Since Nov 2024 Launch

2025-06-24
Stay In Touch
  • Facebook
  • Twitter
  • YouTube
  • LinkedIn
OUR PICKS

Dr Naledi Pandor Calls For “Good Trouble” On Nelson Mandela International Day

2025-07-18

Fuse Lit: SA’s U.S. Tech Bomb ‘Nears Detonation’

2025-07-16

US Denies Mcebisi Jonas’ Visa, Rejects Credentials As Ramaphosa’s Envoy

2025-07-15

Takealot Expands Pickup Points At Pick n Pay For Shopper Convenience

2025-07-14

Subscribe to Updates

Get the latest tech news from TechFinancials about telecoms, fintech and connected life.

About Us

TechFinancials delivers in-depth analysis of tech, digital revolution, fintech, e-commerce, digital banking and breaking tech news.

Facebook X (Twitter) Instagram YouTube LinkedIn WhatsApp Reddit RSS
Our Picks

R66 Million Transnet Fraud: Yakub Ahmed Suleman Bhikhu Setenced To 10 Years In Prison

2025-07-18

Dr Naledi Pandor Calls For “Good Trouble” On Nelson Mandela International Day

2025-07-18

PariPesa South Africa: Online Casino And A Sportsbook Combined In One App

2025-07-18
Recent Posts
  • R66 Million Transnet Fraud: Yakub Ahmed Suleman Bhikhu Setenced To 10 Years In Prison
  • Dr Naledi Pandor Calls For “Good Trouble” On Nelson Mandela International Day
  • PariPesa South Africa: Online Casino And A Sportsbook Combined In One App
  • Public Warned Of Fake Chief Justice Social Media Profiles
  • Call To Address Widening Insurance Protection Gap
TechFinancials
RSS Facebook X (Twitter) LinkedIn YouTube WhatsApp
  • Homepage
  • Newsletter
  • Contact
  • Advertise
  • Privacy Policy
  • About
© 2025 TechFinancials. Designed by TFS Media.

Type above and press Enter to search. Press Esc to cancel.

Ad Blocker Enabled!
Ad Blocker Enabled!
Our website is made possible by displaying online advertisements to our visitors. Please support us by disabling your Ad Blocker.