CHAPTER
16 Deterrence and Adversarial Risk
Overview
• 16.1 Deterrence Requirements
• 16.1.1 Reliable Detection: Risk of Getting Caught
• 16.1.3 Meaningful Consequences
• 16.2 All Adversaries Have Risk Thresholds
• 16.3 System Design Can Modulate Adversary Risk
• 16.3.1 Detection Probability
• 16.3.2 Attribution Probability
• 16.3.3 Consequence Capability and Probability
• 16.3.4 Retaliation Capability and Probability
• 16.4 Uncertainty and Deception
• 16.5 When Detection and Deterrence Do Not Work
Learning Objectives
• Explain the three requirements to achieve deterrence and how to meet them.
• Define an adversary’s ...
Get Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.