Design of action and alliance strategy in defense against anonymous cyber threats

Poster presented in the workshop on “Cybersecurity, & the Governance Gap: Complexity, Contention, Cooperation,” MIT, Cambridge, MA, United States, January 6–7, 2014.

Bibliographic Details
Main Author: Rady, Mina
Format: Other (Poster)
Language:en_US
Published: Explorations in Cyber International Relations 2022
Online Access:https://hdl.handle.net/1721.1/141619
_version_ 1811097132981026816
author Rady, Mina
author_facet Rady, Mina
author_sort Rady, Mina
collection MIT
description Poster presented in the workshop on “Cybersecurity, & the Governance Gap: Complexity, Contention, Cooperation,” MIT, Cambridge, MA, United States, January 6–7, 2014.
first_indexed 2024-09-23T16:54:51Z
format Other (Poster)
id mit-1721.1/141619
institution Massachusetts Institute of Technology
language en_US
last_indexed 2024-09-23T16:54:51Z
publishDate 2022
publisher Explorations in Cyber International Relations
record_format dspace
spelling mit-1721.1/1416192022-04-08T15:45:17Z Design of action and alliance strategy in defense against anonymous cyber threats Rady, Mina Poster presented in the workshop on “Cybersecurity, & the Governance Gap: Complexity, Contention, Cooperation,” MIT, Cambridge, MA, United States, January 6–7, 2014. Anonymity, a major feature of the cyberspace, is a common channel to a multitude of threats. Despite efforts to defend against anonymous threats, their rapid evolution challenges the sustainability of any designed strategy for cyber defense. A sustainable cyber defense strategy must be able to dynamically adapt to information about new threats and to utilize international alliance when necessary without violating fundamental ethics. Our earlier research in 2012 analyzed ways to influence anonymous networks that can either undermine the network performance or undermine the anonymity of connecting users. Earlier we concluded that most influential control actions are accessible to State level actors. Here we propose a defense strategy design approach that begins with assessment of the control capacities of State actors over the given threat space (in our case, anonymity). Then we delineate the various motivations for States to exercise control over anonymous communication. We suggest a strategy design process that rests on alliance with States who share the control motivation and who possess highest possible control capacity. This strategy relies on a quality-controlled information system based on mapping new information about the Cyberspace into a compatible hierarchical classification. This material is based upon work supported by the Office of Naval Research under Grant No. N00014-09-1-0597. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the Office of Naval Research. 2022-04-04T05:31:59Z 2022-04-04T05:31:59Z 2014-01-06 Other (Poster) https://hdl.handle.net/1721.1/141619 Rady, M. (2014, January 6–7). Design of action and alliance strategy in defense against anonymous cyber threats [Poster session]. ECIR Workshop on "Cyber Security & the Governance Gap: Complexity, Contention, Cooperation," MIT, Cambridge, MA. en_US Attribution-NonCommercial-NoDerivs 3.0 United States http://creativecommons.org/licenses/by-nc-nd/3.0/us/ application/pdf Explorations in Cyber International Relations
spellingShingle Rady, Mina
Design of action and alliance strategy in defense against anonymous cyber threats
title Design of action and alliance strategy in defense against anonymous cyber threats
title_full Design of action and alliance strategy in defense against anonymous cyber threats
title_fullStr Design of action and alliance strategy in defense against anonymous cyber threats
title_full_unstemmed Design of action and alliance strategy in defense against anonymous cyber threats
title_short Design of action and alliance strategy in defense against anonymous cyber threats
title_sort design of action and alliance strategy in defense against anonymous cyber threats
url https://hdl.handle.net/1721.1/141619
work_keys_str_mv AT radymina designofactionandalliancestrategyindefenseagainstanonymouscyberthreats