CHAPTER

16   Deterrence and Adversarial Risk

Overview

•   16.1 Deterrence Requirements

•   16.1.1 Reliable Detection: Risk of Getting Caught

•   16.1.2 Reliable Attribution

•   16.1.3 Meaningful Consequences

•   16.2 All Adversaries Have Risk Thresholds

•   16.3 System Design Can Modulate Adversary Risk

•   16.3.1 Detection Probability

•   16.3.2 Attribution Probability

•   16.3.3 Consequence Capability and Probability

•   16.3.4 Retaliation Capability and Probability

•   16.3.5 Risky Behavior

•   16.4 Uncertainty and Deception

•   16.4.1 Uncertainty

•   16.4.2 Deception

•   16.5 When Detection and Deterrence Do Not Work

Learning Objectives

•   Explain the three requirements to achieve deterrence and how to meet them.

•   Define an adversary’s ...

Get Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.