O'Reilly logo

Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time by O. Sami Saydjari

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER

16   Deterrence and Adversarial Risk

Overview

•   16.1 Deterrence Requirements

•   16.1.1 Reliable Detection: Risk of Getting Caught

•   16.1.2 Reliable Attribution

•   16.1.3 Meaningful Consequences

•   16.2 All Adversaries Have Risk Thresholds

•   16.3 System Design Can Modulate Adversary Risk

•   16.3.1 Detection Probability

•   16.3.2 Attribution Probability

•   16.3.3 Consequence Capability and Probability

•   16.3.4 Retaliation Capability and Probability

•   16.3.5 Risky Behavior

•   16.4 Uncertainty and Deception

•   16.4.1 Uncertainty

•   16.4.2 Deception

•   16.5 When Detection and Deterrence Do Not Work

Learning Objectives

•   Explain the three requirements to achieve deterrence and how to meet them.

•   Define an adversary’s ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required