O Conceito de dissuasão cibernética: relevância e possibilidades

The concept of cyber dissuasion: relevance and possibilities

Contenido principal del artículo

Resumen

Este artículo pretende discutir la posibilidad de aplicar el concepto de disuasión en el ambiente cibernético. En vista de su creciente importancia, el ciberespacio ocupa una dimensión central en las preocupaciones estratégicas de cualquier nación. Ante la posibilidad de conflictos cibernéticos, la reflexión sobre el concepto de disuasión cibernética, así como sobre su relevancia, es fundamental. De esta forma, el trabajo busca discutir el concepto, considerando sus aplicaciones y limitaciones, como también sus principales características, evaluando sus similitudes y diferencias con relación al concepto de disuasión convencional. Tras una discusión sobre el concepto de disuasión y sus particularidades, presenta un análisis de la ciberseguridad, dando especial atención a la discusión de las ciberamenazas. Finalmente, discute la aplicación del concepto de disuasión en el ámbito de la ciberseguridad, demostrando su aplicabilidad y destacando sus principales potenciales y límites.

Palabras clave:

Descargas

Los datos de descargas todavía no están disponibles.

Detalles del artículo

Referencias (VER)

ABNT. (2015). ABNT NBR ISO/IEC 27032. Tecnologia da Informação - Técnicas de segurança – Diretrizes para segurança cibernética. Brasília: Associação Brasileira de Normas Técnicas

Allison, G. T. (1971). Essence of decision: explaining the Cuban missile crisis. Boston: Little, Brown.

Angell, N. (1911). The great illusion: a study of the relation of military power in nations to their economic and social advantages. Toronto: Mcclelland and Goodchild.

Australian Government. (2020). Australia’s Cyber Security Strategy 2020. Australian Government Department of Home Affairs. https://www.homeaffairs.gov.au/cyber-security-subsite/files/cyber-security-strategy-2020.pdf

Brantly, A. (2018). The Cyber Deterrence Problem. In T. Minárik, R. Jakschis, & L. Lindström (Eds.), 2018 10th International Conference on Cyber Conflict CyCon X: Maximising Effects (pp. 31–54). Tallinn: Nato Cooperative Cyber Defence Centre

of Excellence.

Brasil. (2014). MD31-M-07 Doutrina Militar de Defesa Cibernética. Obtido do Ministério da Defesa website: https://bdex.eb.mil.br/jspui/bitstream/123456789/136/1/MD31_M07.pdf

Brasil. (24/07/2020). Processo de adesão à Convenção de Budapeste - Nota Conjunta do Ministério das Relações Exteriores e do Ministério da Justiça e Segurança Pública. Obtido em 2 de novembro de 2020, do: http://www.itamaraty.gov.br/pt-BR/notas-a-imprensa/21146-processo-de-adesao-aconvencao-de-budapeste-nota-conjunta-do-ministerio-das-relacoes-exteriores-e-do-ministerioda-justica-e-seguranca-publica

Brodie, B. (1959). Strategy in the Missile Age. Santa Monica: Rand.

Brodie, B. (Ed.). (1946). The Absolute Weapon: Atomic Power and World Order. New York: Harcourt, Brace and Co.

Cademartor, L. H. U., & Santos, P. C. (2016). A Interdependência Complexa e a Questão dos Direitos Humanos no Contexto das Relações Internacionais. Revista Brasileira de Direito, 12(2), 71–81. https://doi.org/10.18256/2238-0604/revistadedireito.v12n2p71-81

Clarke, R. A., & Knake, R. (2011). Cyber War. New York: Harpercollins.

Cornish, P. (2010). Arms control tomorrow: the challenge of nuclear weapons in the twenty-first century. In: R. Niblett (Ed.). America and a Changed World: A Question of Leadership, (pp.223–237).

Council of Europe. (2014). Convention on Cybercrime. Obtido em 31 de outubro de 2020, do website: https://www.coe.int/en/web/conventions/fulllist/-/conventions/treaty/185/signatures

Dhillon, G. (2007). Principles of information systems security: text and cases. Hoboken, Nj: Wiley, C.

Doffman, Z. (06/05/2019). Israel Responds To Cyber Attack With Air Strike On Cyber Attackers In World First. Obtido em 2 de novembro de 2020, do website: https://www.forbes.com/sites/zakdoffman/2019/05/06/israeli-militarystrikes-and-destroys-hamas-cyber-hq-in-worldfirst/?sh=6a5bfcc7afb5

Ferraço, R. (2014). cpi Da Espionagem Relatório Final. Obtido do website: https://www12.senado.leg.br/noticias/arquivos/2014/04/04/integra-dorelatorio-de-ferraco

Geers, K. (2011). Strategic Cyber Security. Tallinn: NATO Cooperative Cyber Defense Centre of Excellence.

George, A. L., & Smoke, R. (1974). Deterrence in American foreign policy: theory and practice. New York: Columbia University Press.

Gertz, B. (/16/07/2013). U.S., China Conclude Strategic and Economic Dialogue Talks. Obtido em 31 de outubro de 2020 do Washington Free Beacon website: https://freebeacon.com/national-security/u-s-china-conclude-strategicand-conomic-dialogue-talks/

Giles, K., & Hagestad, W. (2013, June 1). Divided by a common language: Cyber definitions in Chinese, Russian and English. Obtido em 4 de novembro de 2020 do IEEE Xplore website: https://ieeexplore.ieee.org/abstract/document/6568390

Gobierno de España. (2019). Estrategia Nacional de Ciberseguridad 2019. Departamento de seguridad nacional. https://www.dsn.gob.es/ca/file/2989/download?token=EuVy2lNr#:~:text=Spain

Goodman, W. (2010). Cyber Deterrence: Tougher in Theory than in Practice? Strategic Studies Quarterly, 4(3), 102–135.

Gray, C. S. (1990). The definitions and assumptions of deterrence: Questions of theory and practice. Journal of Strategic Studies, 13(4), 1–18. https://doi.org/10.1080/01402399008437428

Gray, C. S. (1999). The second nuclear age. Boulder: Lynne Rienner.

Healey, J. (22/02/2012). Beyond Attribution: Seeking National Responsibility in Cyberspace. Obtido em 30 de outubro de 2020 do Atlantic Council website: https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/beyondattribution-seeking-national-responsibility-incyberspace/

Hughes, W. P., & Girrier, R. (2018). Fleet tactics and naval operations (2a ed.). Annapolis, Maryland: Naval Institute Press.

Iasiello, E. (2014). Is Cyber Deterrence an Illusory Course of Action? Journal of Strategic Security, 7(1), 54–67. https://doi.org/10.5038/1944-0472.7.1.5

IDF, I. D. F. (05/05/2019). Cleared for Release. Obtido em 17 de outubro de 2020 do Twitter: https://twitter.com/IDF/status/1125066395010699264?s=20

ISO, I. O. for S. (2018). ISO/IEC 27000. Information technology -- Security techniques – Information security management systems -- Overview and vocabulary. ISO - International Organization for Standardization.

Janis, I. L. (1982). Groupthink: psychological studies of policy decisions and fiascoes. Boston: Houghton Mifflin.

Jensen, E. (2012). Cyber Deterrence. Emory International Law Review, 26(2), 773–824. https://digitalcommons.law.byu.edu/faculty_scholarship/231/

Jervis, R. (1979). Deterrence Theory Revisited. World Politics, 31(2), 289–324. https://doi.org/10.2307/2009945

Jervis, R., Lebow, R. N., & Stein, J. G. (1985). Psychology and deterrence. Baltimore: Johns Hopkins University Press.

Karpavičiūtė, I. (2019). Strategic Stability: It Takes Two to Tango? Lithuanian Annual Strategic Review, 17(1), 97–121. https://doi.org/10.2478/lasr-2019-0004

Kaspersky. (08/11/2018). O que é uma ameaça persistente avançada (apt)? Obtido em 1º de novembro de 2020, do: www.kaspersky.com.br website: https://www.kaspersky.com.br/resource-center/definitions/advanced-persistent-threats

Keohane, R. O., & Nye, J. S. (1977). Power and interdependence: world politics in transition. Boston: Little, Brown.

Klimburg, A. (Ed.). (2012). National cyber security framework manual. Tallinn: Nato Cooperative Cyber Defense Centre of Excellence.

Knopf, J. W. (2010). The Fourth Wave in Deterrence Research. Contemporary Security Policy, 31(1), 1–33. https://doi.org/10.1080/13523261003640819

Lewis, J. A. (2009) Fog of Cyberwar: Discouraging Deterrence. Switzerland: International Relations and Security Network.

Libicki, M. C. (2009). Cyberdeterrence and cyberwar. Santa Monica, Ca: Rand.

Long, A. G. (2008). Deterrence-From Cold War to long war: lessons from six decades of rand research. Santa Monica: rand.

Lupovici, A. (2010). The Emerging Fourth Wave of Deterrence Theory: Toward a New Research Agenda. International Studies Quarterly, 54(3), 705–732. https://doi.org/10.1111/j.1468-2478.2010.00606.x

Lynn, W. (2010). Defending a New Domain: The Pentagon’s Cyberstrategy. Foreign Affairs, 89(5), 97–108. https://www.jstor.org/stable/20788647

McKenzie, T. M. (2017). Is cyber deterrence possible? Alabama: Air University Press, Air Force Research Institute.

Mearsheimer, J. J. (1981). The theory and practice of conventional deterrence (PhD Thesis.; p. 485). Cornell University.

Morgan, P. M. (2003). Deterrence now. Cambridge: Cambridge University Press.

Muller, R. (2004). The Origins of mad: A Short History of City-Busting. In H. D. Sokolski (Ed.), Getting MAD Nuclear mutual assured destruction, its origins and practice (pp. 15–50). Carlisle: Strategic Studies Institute.

Myers, J., & Whiting, K. (2019, January 16). These are the biggest risks facing our world in 2019. Obtido em 27 de outubro de 2020 do World Economic Forum website: https://www.weforum.org/agenda/2019/01/these-are-the-biggest-risksfacing-our-world-in-2019/

Newman, L. H. (2019, May 6). What Israel’s Strike on Hamas Hackers Means For Cyberwar. Wired. Retrieved from https://www.wired.com/story/israel-hamas-cyberattack-air-strike-cyberwar/

Nye, J. (2016). Deterrence and Dissuasion in Cyberspace. Journal of Cyber Policy, 1(2), 44–71. https://doi.org/10.1162/ISEC_a_00266

Putten, F.-P. V. D., Meijnders, M., & Rood, J. (2015). Deterrence as a security concept against non-traditional threats (pp. 1–64). Obtido do website: https://www.clingendael.org/sites/default/files/pdfs/deterrence_as_a_security_concept_against_non_traditional_threats.pdf

República de Colombia. (2016). Política Nacional de Seguridad Digital. Consejo Nacional de Política Económica y Social: https://bibliotecadigital.ccb.org.co/bitstream/handle/11520/14856/DNP-Conpes-Pol%2b%c2%a1tica%20Nacional%20de%20Seguridad%20Digital.pdf?sequence=1&isAllowed=y

Ryan, N. J. (2017). Five Kinds of Cyber Deterrence. Philosophy & Technology, 31(3), 331–338. https://doi.org/10.1007/s13347-016-0251-1

Samson, V., & Weeden, B. (Eds.). (2020). Global Counterspace Capabilities: An Open Source Assessment. Obtido do Secure World Foundation website: https://swfound.org/media/206970/swf_counterspace2020_electronic_final.pdf

Schelling, T. C. (1960). The strategy of conflict. Cambridge: Harvard University Press.

Schelling, T. C. (1966). Arms and Influence. New Heaven: Yale University Press

Sêmola, M. (2014). Gestão da Segurança da Informação: uma visão executiva (2ª ed.). Rio de Janeiro: Elsevier.

Singer, P. W., & Friedman, A. (2014). Cybersecurity and cyberwar: what everyone needs to know. Oxford: Oxford University Press.

Snyder, G. (1961). Deterrence or Defense. Princeton: Princeton University Press.

Snyder, G. H. (1960). Deterrence and power. Journal of Conflict Resolution, 4(2), 163–178. https://doi.org/10.1177/002200276000400201

Steinbruner, J. (1976). Beyond Rational Deterrence: The Struggle for New Conceptions. World Politics, 28(2), 223–245. https://doi.org/10.2307/2009891

Syeed, N. (12/04/2017). Outer-Space Hacking a Top Concern for nasa’s Cybersecurity Chief. Bloomberg.com. Obtido do website: https://www.bloomberg.com/news/articles/2017-04-12/outer-space-hacking-a-top-concern-for-nasa-scybersecurity-chief

Ten, C.-W., Manimaran, G., & Liu, C.-C. (2010). Cybersecurity for Critical Infrastructures: Attack and Defense Modeling. ieee Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans, 40(4), 853–865. https://doi.org/10.1109/tsmca.2010.2048028

The White House. (2011). International Strategy for Cyberspace. Obtido do White House website: https://assets.documentcloud.org/documents/2700127/Document-46.pdf

The White House. (2018). National Cyber Strategy of the United States of America. Obtido do Trump White House Archives: https://trumpwhitehouse.archives.gov/wp-content/uploads/2018/09/National-Cyber-Strategy.pdf

Thucydides. (2009). The Peloponnesian War (M. Hammond, Trans.). Oxford: Oxford University Press. Ventures, C. (2020). 2019 Official Annual Cybercrime Report. Obtido website: https://www.herjavecgroup.com/wp-content/uploads/2018/12/CV-HG-2019-Official-Annual-Cybercrime-Report.pdf

Villa, R. A. D. (2006). A segurança internacional no pós-guerra fria: um balanço da teoria tradicional e das novas agendas de pesquisa. Bib: Revista Brasileira de Informação Bibliográfica Em Ciências Sociais, 62(2° semestre), p. 19-31.

Von Solms, R., & Van Niekerk, J. (2013). From information security to cyber security. Computers & Security, 38(1), 97–102. https://doi.org/10.1016/j.cose.2013.04.004

Walt, S. M. (1991). The Renaissance of Security Studies. International Studies Quarterly, 35(2), 211–239. https://doi.org/10.2307/2600471

Wilner, A. (2017). Cyber deterrence and critical-infrastructure protection: Expectation, application, and limitation. Comparative Strategy, 36(4), 309–318. https://doi.org/10.1080/01495933.2017.1361202

Wilson, W. (1918). President Woodrow Wilson’s Fourteen Points. Obtido do website: https://avalon.law.yale.edu/20th_century/wilson14.asp

Wohlstetter, A. (1959). The Delicate Balance of Terror. Foreign Affairs, 37(2), 211–234. https://doi.org/10.2307/20029345

Wolfers, A. (1946). The Atomic Bomb and Soviet- American relation. In B. Brodie (Ed.), The Absolute Weapon: Atomic Power and World Order (pp.90–123). New York: Harcourt, Brace and Co.

Zetter, K. (2017). Contagem Regressiva Até Zero Day. Rio de Janeiro: Brasport.

Citado por