Abstract
Deterrence theory states that world stability can be maintained if the costs of war far out-weigh its benefits. Weapons and strategies that make defense cheaper and offense more costly decrease the likelihood of conflict. Nuclear weapons may have thereby helped create the stability of the Cold War via the costs associated with launching first; according to this argument, war between the US and USSR never occurred because the price of war (i.e. mutual destruction) was too high. This theoretical paper will extend this argument to cyber-attacks and suggest that in order to maintain the security of a nation’s information technology, cyber-defense systems that correspond with Deterrence theory must be introduced. Cyber-attacks can be deterred if the proper system, a virus wall, is in place to counter any infiltration of a nation’s defense systems. This proposed virus wall would be a way to achieve stability from nation state cyber-attacks. Theoretical advancements of International Relations will also be proposed, specifically considering the area of Security Studies.
The characteristic vice of the utopian is naivety; of the realist, sterility.
EH Carr
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
I am in no way a computer expert, but I am attempting to create a new way to protect data. In this sense, this part presented some difficulty, but the idea behind, deterrence, is solid. Hopefully, this idea will be picked up by an agency or computer security company.
References
Buzan, B., Waever, O., & de Wilde, J. (1998). Security: A new framework for analysis. Colorado: Lyne Rienner.
Carr, E. H. (1978). The twenty years crisis, 1919–1939: An introduction to the study of international relations. London: Macmillan.
Cheswik, W., Bellowin, S., & Rubin, A. (2003). Firewalls and internet security: Repelling the wily hacker. Boston: Pearson Education, Inc.
Clark, W. K., & Levin, P. L. (2009, November 1). Securing the information highway. Foreign affairs. Retrieved September 12, 2012, from http://www.foreignaffairs.com/articles/65499/wesley-k-clark-and-peter-l-levin/securing-the-information-highway.
US Army Cyber Command (2012). Retrieved September 12, 2012 from http://www.arcyber.army.mil/.
Giddens, J. (2003). Runaway world: How globalization is reshaping our lives. New York: Routledge.
Keohane, R. (1984). After hegemony: Cooperation and discord in the world political economy. Princeton, NJ: Princeton University Press.
Krasner, S. (1983). International regimes. Cambridge: Cornell University Press.
Kupchan, C. A. (2010, March 1). Enemies into friends. Foreign affairs. Retrieved September 12, 2012, from http://www.foreignaffairs.com/articles/65986/charles-a-kupchan/enemies-into-friends.
Linday, J. (2012). George W. Bush and Barack Obama: The future of US leadership. International Affairs, 87(4), 765–779.
Mathiason, J. (2009). Internet governance: The new frontiers of global institutions. New York: Routledge.
Morgenthau, H. (1985). Politics among nations: The struggle for power and peace. New York: Alfred A. Knopf.
BBC News, (2012a).US Pentagon to treat cyber-attacks as ‘acts of war’. Last modified June 1, 2011. Retrieved September, 2012 from http://www.bbc.co.uk/news/world-us-canada-13614125.
BBC News, (2012b). Internet based attacks on critical systems rise. Last modified April 18, 2011. Retrieved September 12, 2012 from http://www.bbc.com/news/technology-13122339.
BBC News (2012c). Flame: Massive Cyber-attack discovered, researchers say. Retrieved September 12, 2012 from http://www.bbc.com/news/technology-18238326.
Obama, B. (2009). Inaugural Address. Retrieved September 2012 from http://www.presidency.ucsb.edu/ws/index.php?pid=44&st=&st1=#axzz1cX85656y.
Parent, J. M., & MacDonald, P. K. (2011, October 14). The wisdom of retrenchment. Foreign affairs. Retrieved September 12, 2012, from http://www.foreignaffairs.com/articles/136510/joseph-m-parent-and-paul-k-macdonald/the-wisdom-of-retrenchment.
Radford, B. (2012) Does the internet have a ‘kill-switch’? in Discovery News. Retrieved September 12, 2012 from http://news.discovery.com/tech/does-the-internet-have-a-kill-switch-120907.html.
Schelling, T. (1960). The strategy of conflict. London: Oxford University Press.
Ullman, R. (1983). Redefining security. International Security, 8(1), 129–153.
van Evera, S. (1998). Offense, defense and the causes of war. International Security, 22(4), 5–43.
Waltz, K. (1979). Theory of international relations. New York: Columbia University Press.
Waltz, K. (1989). Origins of War in Neorealist theory. Journal of Interdisciplinary History, 18(4), 615–628.
Overwatch Textron Systems. (2012). September 14, 2012 from http://www.overwatchsys.com/.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Kassab, H.S. (2014). In Search of Cyber Stability: International Relations, Mutually Assured Destruction and the Age of Cyber Warfare. In: Kremer, JF., Müller, B. (eds) Cyberspace and International Relations. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-37481-4_4
Download citation
DOI: https://doi.org/10.1007/978-3-642-37481-4_4
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-37480-7
Online ISBN: 978-3-642-37481-4
eBook Packages: Humanities, Social Sciences and LawPolitical Science and International Studies (R0)