O Conceito de dissuasão cibernética: relevância e possibilidades

Este artículo pretende discutir la posibilidad de aplicar el concepto de disuasión en el ambiente cibernético. En vista de su creciente importancia, el ciberespacio ocupa una dimensión central en las preocupaciones estratégicas de cualquier nación. Ante la posibilidad de conflictos cibernéticos, la...

Full description

Autores:
Araújo Lisboa , Cícero
Ziebell de Oliveira, Guilherme
Tipo de recurso:
Article of journal
Fecha de publicación:
2021
Institución:
Universidad Externado de Colombia
Repositorio:
Biblioteca Digital Universidad Externado de Colombia
Idioma:
spa
OAI Identifier:
oai:bdigital.uexternado.edu.co:001/8572
Acceso en línea:
https://bdigital.uexternado.edu.co/handle/001/8572
https://doi.org/10.18601/16577558.n35.04
Palabra clave:
cyber deterrence,
conventional deterrence,
cyber security,
international security
disuasión cibernética,
disuasión convencional,
seguridad cibernética,
seguridad internacional
dissuasão cibernética;
dissuasão convencional;
segurança cibernética;
segurança internacional
Rights
openAccess
License
Cícero Araújo Lisboa , Guilherme Ziebell de Oliveira - 2021
id uexternad2_720fabe2a7fb21b75651e99aea916789
oai_identifier_str oai:bdigital.uexternado.edu.co:001/8572
network_acronym_str uexternad2
network_name_str Biblioteca Digital Universidad Externado de Colombia
repository_id_str
dc.title.spa.fl_str_mv O Conceito de dissuasão cibernética: relevância e possibilidades
dc.title.translated.eng.fl_str_mv The concept of cyber dissuasion: relevance and possibilities
title O Conceito de dissuasão cibernética: relevância e possibilidades
spellingShingle O Conceito de dissuasão cibernética: relevância e possibilidades
cyber deterrence,
conventional deterrence,
cyber security,
international security
disuasión cibernética,
disuasión convencional,
seguridad cibernética,
seguridad internacional
dissuasão cibernética;
dissuasão convencional;
segurança cibernética;
segurança internacional
title_short O Conceito de dissuasão cibernética: relevância e possibilidades
title_full O Conceito de dissuasão cibernética: relevância e possibilidades
title_fullStr O Conceito de dissuasão cibernética: relevância e possibilidades
title_full_unstemmed O Conceito de dissuasão cibernética: relevância e possibilidades
title_sort O Conceito de dissuasão cibernética: relevância e possibilidades
dc.creator.fl_str_mv Araújo Lisboa , Cícero
Ziebell de Oliveira, Guilherme
dc.contributor.author.spa.fl_str_mv Araújo Lisboa , Cícero
Ziebell de Oliveira, Guilherme
dc.subject.eng.fl_str_mv cyber deterrence,
conventional deterrence,
cyber security,
international security
topic cyber deterrence,
conventional deterrence,
cyber security,
international security
disuasión cibernética,
disuasión convencional,
seguridad cibernética,
seguridad internacional
dissuasão cibernética;
dissuasão convencional;
segurança cibernética;
segurança internacional
dc.subject.spa.fl_str_mv disuasión cibernética,
disuasión convencional,
seguridad cibernética,
seguridad internacional
dissuasão cibernética;
dissuasão convencional;
segurança cibernética;
segurança internacional
description Este artículo pretende discutir la posibilidad de aplicar el concepto de disuasión en el ambiente cibernético. En vista de su creciente importancia, el ciberespacio ocupa una dimensión central en las preocupaciones estratégicas de cualquier nación. Ante la posibilidad de conflictos cibernéticos, la reflexión sobre el concepto de disuasión cibernética, así como sobre su relevancia, es fundamental. De esta forma, el trabajo busca discutir el concepto, considerando sus aplicaciones y limitaciones, como también sus principales características, evaluando sus similitudes y diferencias con relación al concepto de disuasión convencional. Tras una discusión sobre el concepto de disuasión y sus particularidades, presenta un análisis de la ciberseguridad, dando especial atención a la discusión de las ciberamenazas. Finalmente, discute la aplicación del concepto de disuasión en el ámbito de la ciberseguridad, demostrando su aplicabilidad y destacando sus principales potenciales y límites.
publishDate 2021
dc.date.issued.none.fl_str_mv 2021-01-01
dc.date.accessioned.none.fl_str_mv 2022-01-01 00:00:00
2022-09-08T13:50:16Z
dc.date.available.none.fl_str_mv 2022-01-01 00:00:00
2022-09-08T13:50:16Z
dc.type.spa.fl_str_mv Artículo de revista
dc.type.coar.fl_str_mv http://purl.org/coar/resource_type/c_2df8fbb1
dc.type.coar.spa.fl_str_mv http://purl.org/coar/resource_type/c_6501
http://purl.org/coar/resource_type/c_6501
dc.type.coarversion.spa.fl_str_mv http://purl.org/coar/version/c_970fb48d4fbd8a85
dc.type.content.spa.fl_str_mv Text
dc.type.driver.spa.fl_str_mv info:eu-repo/semantics/article
dc.type.local.eng.fl_str_mv Journal article
dc.type.redcol.spa.fl_str_mv http://purl.org/redcol/resource_type/ARTREF
dc.type.version.spa.fl_str_mv info:eu-repo/semantics/publishedVersion
format http://purl.org/coar/resource_type/c_6501
status_str publishedVersion
dc.identifier.doi.none.fl_str_mv 10.18601/16577558.n35.04
dc.identifier.eissn.none.fl_str_mv 2346-2132
dc.identifier.issn.none.fl_str_mv 1657-7558
dc.identifier.uri.none.fl_str_mv https://bdigital.uexternado.edu.co/handle/001/8572
dc.identifier.url.none.fl_str_mv https://doi.org/10.18601/16577558.n35.04
identifier_str_mv 10.18601/16577558.n35.04
2346-2132
1657-7558
url https://bdigital.uexternado.edu.co/handle/001/8572
https://doi.org/10.18601/16577558.n35.04
dc.language.iso.spa.fl_str_mv spa
language spa
dc.relation.bitstream.none.fl_str_mv https://revistas.uexternado.edu.co/index.php/oasis/article/download/7556/12040
https://revistas.uexternado.edu.co/index.php/oasis/article/download/7556/12041
https://revistas.uexternado.edu.co/index.php/oasis/article/download/7556/12042
dc.relation.citationedition.spa.fl_str_mv Núm. 35 , Año 2022 : Enero-Junio
dc.relation.citationendpage.none.fl_str_mv 78
dc.relation.citationissue.spa.fl_str_mv 35
dc.relation.citationstartpage.none.fl_str_mv 53
dc.relation.ispartofjournal.spa.fl_str_mv Oasis
dc.relation.references.spa.fl_str_mv ABNT. (2015). ABNT NBR ISO/IEC 27032. Tecnologia da Informação - Técnicas de segurança – Diretrizes para segurança cibernética. Brasília: Associação Brasileira de Normas Técnicas
Allison, G. T. (1971). Essence of decision: explaining the Cuban missile crisis. Boston: Little, Brown.
Angell, N. (1911). The great illusion: a study of the relation of military power in nations to their economic and social advantages. Toronto: Mcclelland and Goodchild.
Australian Government. (2020). Australia’s Cyber Security Strategy 2020. Australian Government Department of Home Affairs. https://www.homeaffairs.gov.au/cyber-security-subsite/files/cyber-security-strategy-2020.pdf
Brantly, A. (2018). The Cyber Deterrence Problem. In T. Minárik, R. Jakschis, & L. Lindström (Eds.), 2018 10th International Conference on Cyber Conflict CyCon X: Maximising Effects (pp. 31–54). Tallinn: Nato Cooperative Cyber Defence Centre of Excellence.
Brasil. (2014). MD31-M-07 Doutrina Militar de Defesa Cibernética. Obtido do Ministério da Defesa website: https://bdex.eb.mil.br/jspui/bitstream/123456789/136/1/MD31_M07.pdf
Brasil. (24/07/2020). Processo de adesão à Convenção de Budapeste - Nota Conjunta do Ministério das Relações Exteriores e do Ministério da Justiça e Segurança Pública. Obtido em 2 de novembro de 2020, do: http://www.itamaraty.gov.br/pt-BR/notas-a-imprensa/21146-processo-de-adesao-aconvencao-de-budapeste-nota-conjunta-do-ministerio-das-relacoes-exteriores-e-do-ministerioda-justica-e-seguranca-publica
Brodie, B. (1959). Strategy in the Missile Age. Santa Monica: Rand.
Brodie, B. (Ed.). (1946). The Absolute Weapon: Atomic Power and World Order. New York: Harcourt, Brace and Co.
Cademartor, L. H. U., & Santos, P. C. (2016). A Interdependência Complexa e a Questão dos Direitos Humanos no Contexto das Relações Internacionais. Revista Brasileira de Direito, 12(2), 71–81. https://doi.org/10.18256/2238-0604/revistadedireito.v12n2p71-81
Clarke, R. A., & Knake, R. (2011). Cyber War. New York: Harpercollins.
Cornish, P. (2010). Arms control tomorrow: the challenge of nuclear weapons in the twenty-first century. In: R. Niblett (Ed.). America and a Changed World: A Question of Leadership, (pp.223–237).
Council of Europe. (2014). Convention on Cybercrime. Obtido em 31 de outubro de 2020, do website: https://www.coe.int/en/web/conventions/fulllist/-/conventions/treaty/185/signatures
Dhillon, G. (2007). Principles of information systems security: text and cases. Hoboken, Nj: Wiley, C.
Doffman, Z. (06/05/2019). Israel Responds To Cyber Attack With Air Strike On Cyber Attackers In World First. Obtido em 2 de novembro de 2020, do website: https://www.forbes.com/sites/zakdoffman/2019/05/06/israeli-militarystrikes-and-destroys-hamas-cyber-hq-in-worldfirst/?sh=6a5bfcc7afb5
Ferraço, R. (2014). cpi Da Espionagem Relatório Final. Obtido do website: https://www12.senado.leg.br/noticias/arquivos/2014/04/04/integra-dorelatorio-de-ferraco
Geers, K. (2011). Strategic Cyber Security. Tallinn: NATO Cooperative Cyber Defense Centre of Excellence.
George, A. L., & Smoke, R. (1974). Deterrence in American foreign policy: theory and practice. New York: Columbia University Press.
Gertz, B. (/16/07/2013). U.S., China Conclude Strategic and Economic Dialogue Talks. Obtido em 31 de outubro de 2020 do Washington Free Beacon website: https://freebeacon.com/national-security/u-s-china-conclude-strategicand-conomic-dialogue-talks/
Giles, K., & Hagestad, W. (2013, June 1). Divided by a common language: Cyber definitions in Chinese, Russian and English. Obtido em 4 de novembro de 2020 do IEEE Xplore website: https://ieeexplore.ieee.org/abstract/document/6568390
Gobierno de España. (2019). Estrategia Nacional de Ciberseguridad 2019. Departamento de seguridad nacional. https://www.dsn.gob.es/ca/file/2989/download?token=EuVy2lNr#:~:text=Spain
Goodman, W. (2010). Cyber Deterrence: Tougher in Theory than in Practice? Strategic Studies Quarterly, 4(3), 102–135.
Gray, C. S. (1990). The definitions and assumptions of deterrence: Questions of theory and practice. Journal of Strategic Studies, 13(4), 1–18. https://doi.org/10.1080/01402399008437428
Gray, C. S. (1999). The second nuclear age. Boulder: Lynne Rienner.
Healey, J. (22/02/2012). Beyond Attribution: Seeking National Responsibility in Cyberspace. Obtido em 30 de outubro de 2020 do Atlantic Council website: https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/beyondattribution-seeking-national-responsibility-incyberspace/
Hughes, W. P., & Girrier, R. (2018). Fleet tactics and naval operations (2a ed.). Annapolis, Maryland: Naval Institute Press.
Iasiello, E. (2014). Is Cyber Deterrence an Illusory Course of Action? Journal of Strategic Security, 7(1), 54–67. https://doi.org/10.5038/1944-0472.7.1.5
IDF, I. D. F. (05/05/2019). Cleared for Release. Obtido em 17 de outubro de 2020 do Twitter: https://twitter.com/IDF/status/1125066395010699264?s=20
ISO, I. O. for S. (2018). ISO/IEC 27000. Information technology -- Security techniques – Information security management systems -- Overview and vocabulary. ISO - International Organization for Standardization.
Janis, I. L. (1982). Groupthink: psychological studies of policy decisions and fiascoes. Boston: Houghton Mifflin.
Jensen, E. (2012). Cyber Deterrence. Emory International Law Review, 26(2), 773–824. https://digitalcommons.law.byu.edu/faculty_scholarship/231/
Jervis, R. (1979). Deterrence Theory Revisited. World Politics, 31(2), 289–324. https://doi.org/10.2307/2009945
Jervis, R., Lebow, R. N., & Stein, J. G. (1985). Psychology and deterrence. Baltimore: Johns Hopkins University Press.
Karpavičiūtė, I. (2019). Strategic Stability: It Takes Two to Tango? Lithuanian Annual Strategic Review, 17(1), 97–121. https://doi.org/10.2478/lasr-2019-0004
Kaspersky. (08/11/2018). O que é uma ameaça persistente avançada (apt)? Obtido em 1º de novembro de 2020, do: www.kaspersky.com.br website: https://www.kaspersky.com.br/resource-center/definitions/advanced-persistent-threats
Keohane, R. O., & Nye, J. S. (1977). Power and interdependence: world politics in transition. Boston: Little, Brown.
Klimburg, A. (Ed.). (2012). National cyber security framework manual. Tallinn: Nato Cooperative Cyber Defense Centre of Excellence.
Knopf, J. W. (2010). The Fourth Wave in Deterrence Research. Contemporary Security Policy, 31(1), 1–33. https://doi.org/10.1080/13523261003640819
Lewis, J. A. (2009) Fog of Cyberwar: Discouraging Deterrence. Switzerland: International Relations and Security Network.
Libicki, M. C. (2009). Cyberdeterrence and cyberwar. Santa Monica, Ca: Rand.
Long, A. G. (2008). Deterrence-From Cold War to long war: lessons from six decades of rand research. Santa Monica: rand.
Lupovici, A. (2010). The Emerging Fourth Wave of Deterrence Theory: Toward a New Research Agenda. International Studies Quarterly, 54(3), 705–732. https://doi.org/10.1111/j.1468-2478.2010.00606.x
Lynn, W. (2010). Defending a New Domain: The Pentagon’s Cyberstrategy. Foreign Affairs, 89(5), 97–108. https://www.jstor.org/stable/20788647
McKenzie, T. M. (2017). Is cyber deterrence possible? Alabama: Air University Press, Air Force Research Institute.
Mearsheimer, J. J. (1981). The theory and practice of conventional deterrence (PhD Thesis.; p. 485). Cornell University.
Morgan, P. M. (2003). Deterrence now. Cambridge: Cambridge University Press.
Muller, R. (2004). The Origins of mad: A Short History of City-Busting. In H. D. Sokolski (Ed.), Getting MAD Nuclear mutual assured destruction, its origins and practice (pp. 15–50). Carlisle: Strategic Studies Institute.
Myers, J., & Whiting, K. (2019, January 16). These are the biggest risks facing our world in 2019. Obtido em 27 de outubro de 2020 do World Economic Forum website: https://www.weforum.org/agenda/2019/01/these-are-the-biggest-risksfacing-our-world-in-2019/
Newman, L. H. (2019, May 6). What Israel’s Strike on Hamas Hackers Means For Cyberwar. Wired. Retrieved from https://www.wired.com/story/israel-hamas-cyberattack-air-strike-cyberwar/
Nye, J. (2016). Deterrence and Dissuasion in Cyberspace. Journal of Cyber Policy, 1(2), 44–71. https://doi.org/10.1162/ISEC_a_00266
Putten, F.-P. V. D., Meijnders, M., & Rood, J. (2015). Deterrence as a security concept against non-traditional threats (pp. 1–64). Obtido do website: https://www.clingendael.org/sites/default/files/pdfs/deterrence_as_a_security_concept_against_non_traditional_threats.pdf
República de Colombia. (2016). Política Nacional de Seguridad Digital. Consejo Nacional de Política Económica y Social: https://bibliotecadigital.ccb.org.co/bitstream/handle/11520/14856/DNP-Conpes-Pol%2b%c2%a1tica%20Nacional%20de%20Seguridad%20Digital.pdf?sequence=1&isAllowed=y
Ryan, N. J. (2017). Five Kinds of Cyber Deterrence. Philosophy & Technology, 31(3), 331–338. https://doi.org/10.1007/s13347-016-0251-1
Samson, V., & Weeden, B. (Eds.). (2020). Global Counterspace Capabilities: An Open Source Assessment. Obtido do Secure World Foundation website: https://swfound.org/media/206970/swf_counterspace2020_electronic_final.pdf
Schelling, T. C. (1960). The strategy of conflict. Cambridge: Harvard University Press.
Schelling, T. C. (1966). Arms and Influence. New Heaven: Yale University Press
Sêmola, M. (2014). Gestão da Segurança da Informação: uma visão executiva (2ª ed.). Rio de Janeiro: Elsevier.
Singer, P. W., & Friedman, A. (2014). Cybersecurity and cyberwar: what everyone needs to know. Oxford: Oxford University Press.
Snyder, G. (1961). Deterrence or Defense. Princeton: Princeton University Press.
Snyder, G. H. (1960). Deterrence and power. Journal of Conflict Resolution, 4(2), 163–178. https://doi.org/10.1177/002200276000400201
Steinbruner, J. (1976). Beyond Rational Deterrence: The Struggle for New Conceptions. World Politics, 28(2), 223–245. https://doi.org/10.2307/2009891
Syeed, N. (12/04/2017). Outer-Space Hacking a Top Concern for nasa’s Cybersecurity Chief. Bloomberg.com. Obtido do website: https://www.bloomberg.com/news/articles/2017-04-12/outer-space-hacking-a-top-concern-for-nasa-scybersecurity-chief
Ten, C.-W., Manimaran, G., & Liu, C.-C. (2010). Cybersecurity for Critical Infrastructures: Attack and Defense Modeling. ieee Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans, 40(4), 853–865. https://doi.org/10.1109/tsmca.2010.2048028
The White House. (2011). International Strategy for Cyberspace. Obtido do White House website: https://assets.documentcloud.org/documents/2700127/Document-46.pdf
The White House. (2018). National Cyber Strategy of the United States of America. Obtido do Trump White House Archives: https://trumpwhitehouse.archives.gov/wp-content/uploads/2018/09/National-Cyber-Strategy.pdf
Thucydides. (2009). The Peloponnesian War (M. Hammond, Trans.). Oxford: Oxford University Press. Ventures, C. (2020). 2019 Official Annual Cybercrime Report. Obtido website: https://www.herjavecgroup.com/wp-content/uploads/2018/12/CV-HG-2019-Official-Annual-Cybercrime-Report.pdf
Villa, R. A. D. (2006). A segurança internacional no pós-guerra fria: um balanço da teoria tradicional e das novas agendas de pesquisa. Bib: Revista Brasileira de Informação Bibliográfica Em Ciências Sociais, 62(2° semestre), p. 19-31.
Von Solms, R., & Van Niekerk, J. (2013). From information security to cyber security. Computers & Security, 38(1), 97–102. https://doi.org/10.1016/j.cose.2013.04.004
Walt, S. M. (1991). The Renaissance of Security Studies. International Studies Quarterly, 35(2), 211–239. https://doi.org/10.2307/2600471
Wilner, A. (2017). Cyber deterrence and critical-infrastructure protection: Expectation, application, and limitation. Comparative Strategy, 36(4), 309–318. https://doi.org/10.1080/01495933.2017.1361202
Wilson, W. (1918). President Woodrow Wilson’s Fourteen Points. Obtido do website: https://avalon.law.yale.edu/20th_century/wilson14.asp
Wohlstetter, A. (1959). The Delicate Balance of Terror. Foreign Affairs, 37(2), 211–234. https://doi.org/10.2307/20029345
Wolfers, A. (1946). The Atomic Bomb and Soviet- American relation. In B. Brodie (Ed.), The Absolute Weapon: Atomic Power and World Order (pp.90–123). New York: Harcourt, Brace and Co.
Zetter, K. (2017). Contagem Regressiva Até Zero Day. Rio de Janeiro: Brasport.
dc.rights.spa.fl_str_mv Cícero Araújo Lisboa , Guilherme Ziebell de Oliveira - 2021
dc.rights.accessrights.spa.fl_str_mv info:eu-repo/semantics/openAccess
dc.rights.coar.spa.fl_str_mv http://purl.org/coar/access_right/c_abf2
dc.rights.uri.spa.fl_str_mv http://creativecommons.org/licenses/by-nc-sa/4.0
rights_invalid_str_mv Cícero Araújo Lisboa , Guilherme Ziebell de Oliveira - 2021
http://purl.org/coar/access_right/c_abf2
http://creativecommons.org/licenses/by-nc-sa/4.0
eu_rights_str_mv openAccess
dc.format.mimetype.spa.fl_str_mv application/pdf
text/html
text/xml
dc.publisher.spa.fl_str_mv Facultad de Finanzas, Gobierno y Relaciones Internacionales
dc.source.spa.fl_str_mv https://revistas.uexternado.edu.co/index.php/oasis/article/view/7556
institution Universidad Externado de Colombia
bitstream.url.fl_str_mv https://bdigital.uexternado.edu.co/bitstreams/b6b4f7f0-6912-4567-9395-fb8d2682b306/download
bitstream.checksum.fl_str_mv b3dd88d075af582c00a7cd321f45a25d
bitstream.checksumAlgorithm.fl_str_mv MD5
repository.name.fl_str_mv Universidad Externado de Colombia
repository.mail.fl_str_mv metabiblioteca@metabiblioteca.org
_version_ 1814100491123032064
spelling Araújo Lisboa , Cícero5490c262-a658-43ec-b09c-638664d2d92cZiebell de Oliveira, Guilherme032315d0-5fd9-4018-9685-d28ea5ed9c772022-01-01 00:00:002022-09-08T13:50:16Z2022-01-01 00:00:002022-09-08T13:50:16Z2021-01-01Este artículo pretende discutir la posibilidad de aplicar el concepto de disuasión en el ambiente cibernético. En vista de su creciente importancia, el ciberespacio ocupa una dimensión central en las preocupaciones estratégicas de cualquier nación. Ante la posibilidad de conflictos cibernéticos, la reflexión sobre el concepto de disuasión cibernética, así como sobre su relevancia, es fundamental. De esta forma, el trabajo busca discutir el concepto, considerando sus aplicaciones y limitaciones, como también sus principales características, evaluando sus similitudes y diferencias con relación al concepto de disuasión convencional. Tras una discusión sobre el concepto de disuasión y sus particularidades, presenta un análisis de la ciberseguridad, dando especial atención a la discusión de las ciberamenazas. Finalmente, discute la aplicación del concepto de disuasión en el ámbito de la ciberseguridad, demostrando su aplicabilidad y destacando sus principales potenciales y límites.This article aims to discuss the applicability of the concept of deterrence to the cyberspace. In view of its growing importance, cyberspace occupies a central dimension in the strategic concerns of any nation. Given the possibility of cybernetic conflicts, reflection on the concept of cyber deterrence, as well as its relevance, is essential. Thus, this article seeks to discuss the concept, considering its applications and limitations, as well as its main characteristics, evaluating its similarities and differences in relation to the concept of conventional deterrence. After a discussion on the concept of deterrence and its particularities, it presents an analysis of cybersecurity, paying special attention to the discussion of cyber threats. Finally, it discusses the application of the concept of deterrence in the field of cybersecurity, demonstrating its applicability and highlighting its main potentials and limitations.application/pdftext/htmltext/xml10.18601/16577558.n35.042346-21321657-7558https://bdigital.uexternado.edu.co/handle/001/8572https://doi.org/10.18601/16577558.n35.04spaFacultad de Finanzas, Gobierno y Relaciones Internacionaleshttps://revistas.uexternado.edu.co/index.php/oasis/article/download/7556/12040https://revistas.uexternado.edu.co/index.php/oasis/article/download/7556/12041https://revistas.uexternado.edu.co/index.php/oasis/article/download/7556/12042Núm. 35 , Año 2022 : Enero-Junio783553OasisABNT. (2015). ABNT NBR ISO/IEC 27032. Tecnologia da Informação - Técnicas de segurança – Diretrizes para segurança cibernética. Brasília: Associação Brasileira de Normas TécnicasAllison, G. T. (1971). Essence of decision: explaining the Cuban missile crisis. Boston: Little, Brown.Angell, N. (1911). The great illusion: a study of the relation of military power in nations to their economic and social advantages. Toronto: Mcclelland and Goodchild.Australian Government. (2020). Australia’s Cyber Security Strategy 2020. Australian Government Department of Home Affairs. https://www.homeaffairs.gov.au/cyber-security-subsite/files/cyber-security-strategy-2020.pdfBrantly, A. (2018). The Cyber Deterrence Problem. In T. Minárik, R. Jakschis, & L. Lindström (Eds.), 2018 10th International Conference on Cyber Conflict CyCon X: Maximising Effects (pp. 31–54). Tallinn: Nato Cooperative Cyber Defence Centre of Excellence.Brasil. (2014). MD31-M-07 Doutrina Militar de Defesa Cibernética. Obtido do Ministério da Defesa website: https://bdex.eb.mil.br/jspui/bitstream/123456789/136/1/MD31_M07.pdfBrasil. (24/07/2020). Processo de adesão à Convenção de Budapeste - Nota Conjunta do Ministério das Relações Exteriores e do Ministério da Justiça e Segurança Pública. Obtido em 2 de novembro de 2020, do: http://www.itamaraty.gov.br/pt-BR/notas-a-imprensa/21146-processo-de-adesao-aconvencao-de-budapeste-nota-conjunta-do-ministerio-das-relacoes-exteriores-e-do-ministerioda-justica-e-seguranca-publicaBrodie, B. (1959). Strategy in the Missile Age. Santa Monica: Rand.Brodie, B. (Ed.). (1946). The Absolute Weapon: Atomic Power and World Order. New York: Harcourt, Brace and Co.Cademartor, L. H. U., & Santos, P. C. (2016). A Interdependência Complexa e a Questão dos Direitos Humanos no Contexto das Relações Internacionais. Revista Brasileira de Direito, 12(2), 71–81. https://doi.org/10.18256/2238-0604/revistadedireito.v12n2p71-81Clarke, R. A., & Knake, R. (2011). Cyber War. New York: Harpercollins.Cornish, P. (2010). Arms control tomorrow: the challenge of nuclear weapons in the twenty-first century. In: R. Niblett (Ed.). America and a Changed World: A Question of Leadership, (pp.223–237).Council of Europe. (2014). Convention on Cybercrime. Obtido em 31 de outubro de 2020, do website: https://www.coe.int/en/web/conventions/fulllist/-/conventions/treaty/185/signaturesDhillon, G. (2007). Principles of information systems security: text and cases. Hoboken, Nj: Wiley, C.Doffman, Z. (06/05/2019). Israel Responds To Cyber Attack With Air Strike On Cyber Attackers In World First. Obtido em 2 de novembro de 2020, do website: https://www.forbes.com/sites/zakdoffman/2019/05/06/israeli-militarystrikes-and-destroys-hamas-cyber-hq-in-worldfirst/?sh=6a5bfcc7afb5Ferraço, R. (2014). cpi Da Espionagem Relatório Final. Obtido do website: https://www12.senado.leg.br/noticias/arquivos/2014/04/04/integra-dorelatorio-de-ferracoGeers, K. (2011). Strategic Cyber Security. Tallinn: NATO Cooperative Cyber Defense Centre of Excellence.George, A. L., & Smoke, R. (1974). Deterrence in American foreign policy: theory and practice. New York: Columbia University Press.Gertz, B. (/16/07/2013). U.S., China Conclude Strategic and Economic Dialogue Talks. Obtido em 31 de outubro de 2020 do Washington Free Beacon website: https://freebeacon.com/national-security/u-s-china-conclude-strategicand-conomic-dialogue-talks/Giles, K., & Hagestad, W. (2013, June 1). Divided by a common language: Cyber definitions in Chinese, Russian and English. Obtido em 4 de novembro de 2020 do IEEE Xplore website: https://ieeexplore.ieee.org/abstract/document/6568390Gobierno de España. (2019). Estrategia Nacional de Ciberseguridad 2019. Departamento de seguridad nacional. https://www.dsn.gob.es/ca/file/2989/download?token=EuVy2lNr#:~:text=SpainGoodman, W. (2010). Cyber Deterrence: Tougher in Theory than in Practice? Strategic Studies Quarterly, 4(3), 102–135.Gray, C. S. (1990). The definitions and assumptions of deterrence: Questions of theory and practice. Journal of Strategic Studies, 13(4), 1–18. https://doi.org/10.1080/01402399008437428Gray, C. S. (1999). The second nuclear age. Boulder: Lynne Rienner.Healey, J. (22/02/2012). Beyond Attribution: Seeking National Responsibility in Cyberspace. Obtido em 30 de outubro de 2020 do Atlantic Council website: https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/beyondattribution-seeking-national-responsibility-incyberspace/Hughes, W. P., & Girrier, R. (2018). Fleet tactics and naval operations (2a ed.). Annapolis, Maryland: Naval Institute Press.Iasiello, E. (2014). Is Cyber Deterrence an Illusory Course of Action? Journal of Strategic Security, 7(1), 54–67. https://doi.org/10.5038/1944-0472.7.1.5IDF, I. D. F. (05/05/2019). Cleared for Release. Obtido em 17 de outubro de 2020 do Twitter: https://twitter.com/IDF/status/1125066395010699264?s=20ISO, I. O. for S. (2018). ISO/IEC 27000. Information technology -- Security techniques – Information security management systems -- Overview and vocabulary. ISO - International Organization for Standardization.Janis, I. L. (1982). Groupthink: psychological studies of policy decisions and fiascoes. Boston: Houghton Mifflin.Jensen, E. (2012). Cyber Deterrence. Emory International Law Review, 26(2), 773–824. https://digitalcommons.law.byu.edu/faculty_scholarship/231/Jervis, R. (1979). Deterrence Theory Revisited. World Politics, 31(2), 289–324. https://doi.org/10.2307/2009945Jervis, R., Lebow, R. N., & Stein, J. G. (1985). Psychology and deterrence. Baltimore: Johns Hopkins University Press.Karpavičiūtė, I. (2019). Strategic Stability: It Takes Two to Tango? Lithuanian Annual Strategic Review, 17(1), 97–121. https://doi.org/10.2478/lasr-2019-0004Kaspersky. (08/11/2018). O que é uma ameaça persistente avançada (apt)? Obtido em 1º de novembro de 2020, do: www.kaspersky.com.br website: https://www.kaspersky.com.br/resource-center/definitions/advanced-persistent-threatsKeohane, R. O., & Nye, J. S. (1977). Power and interdependence: world politics in transition. Boston: Little, Brown.Klimburg, A. (Ed.). (2012). National cyber security framework manual. Tallinn: Nato Cooperative Cyber Defense Centre of Excellence.Knopf, J. W. (2010). The Fourth Wave in Deterrence Research. Contemporary Security Policy, 31(1), 1–33. https://doi.org/10.1080/13523261003640819Lewis, J. A. (2009) Fog of Cyberwar: Discouraging Deterrence. Switzerland: International Relations and Security Network.Libicki, M. C. (2009). Cyberdeterrence and cyberwar. Santa Monica, Ca: Rand.Long, A. G. (2008). Deterrence-From Cold War to long war: lessons from six decades of rand research. Santa Monica: rand.Lupovici, A. (2010). The Emerging Fourth Wave of Deterrence Theory: Toward a New Research Agenda. International Studies Quarterly, 54(3), 705–732. https://doi.org/10.1111/j.1468-2478.2010.00606.xLynn, W. (2010). Defending a New Domain: The Pentagon’s Cyberstrategy. Foreign Affairs, 89(5), 97–108. https://www.jstor.org/stable/20788647McKenzie, T. M. (2017). Is cyber deterrence possible? Alabama: Air University Press, Air Force Research Institute.Mearsheimer, J. J. (1981). The theory and practice of conventional deterrence (PhD Thesis.; p. 485). Cornell University.Morgan, P. M. (2003). Deterrence now. Cambridge: Cambridge University Press.Muller, R. (2004). The Origins of mad: A Short History of City-Busting. In H. D. Sokolski (Ed.), Getting MAD Nuclear mutual assured destruction, its origins and practice (pp. 15–50). Carlisle: Strategic Studies Institute.Myers, J., & Whiting, K. (2019, January 16). These are the biggest risks facing our world in 2019. Obtido em 27 de outubro de 2020 do World Economic Forum website: https://www.weforum.org/agenda/2019/01/these-are-the-biggest-risksfacing-our-world-in-2019/Newman, L. H. (2019, May 6). What Israel’s Strike on Hamas Hackers Means For Cyberwar. Wired. Retrieved from https://www.wired.com/story/israel-hamas-cyberattack-air-strike-cyberwar/Nye, J. (2016). Deterrence and Dissuasion in Cyberspace. Journal of Cyber Policy, 1(2), 44–71. https://doi.org/10.1162/ISEC_a_00266Putten, F.-P. V. D., Meijnders, M., & Rood, J. (2015). Deterrence as a security concept against non-traditional threats (pp. 1–64). Obtido do website: https://www.clingendael.org/sites/default/files/pdfs/deterrence_as_a_security_concept_against_non_traditional_threats.pdfRepública de Colombia. (2016). Política Nacional de Seguridad Digital. Consejo Nacional de Política Económica y Social: https://bibliotecadigital.ccb.org.co/bitstream/handle/11520/14856/DNP-Conpes-Pol%2b%c2%a1tica%20Nacional%20de%20Seguridad%20Digital.pdf?sequence=1&isAllowed=yRyan, N. J. (2017). Five Kinds of Cyber Deterrence. Philosophy & Technology, 31(3), 331–338. https://doi.org/10.1007/s13347-016-0251-1Samson, V., & Weeden, B. (Eds.). (2020). Global Counterspace Capabilities: An Open Source Assessment. Obtido do Secure World Foundation website: https://swfound.org/media/206970/swf_counterspace2020_electronic_final.pdfSchelling, T. C. (1960). The strategy of conflict. Cambridge: Harvard University Press.Schelling, T. C. (1966). Arms and Influence. New Heaven: Yale University PressSêmola, M. (2014). Gestão da Segurança da Informação: uma visão executiva (2ª ed.). Rio de Janeiro: Elsevier.Singer, P. W., & Friedman, A. (2014). Cybersecurity and cyberwar: what everyone needs to know. Oxford: Oxford University Press.Snyder, G. (1961). Deterrence or Defense. Princeton: Princeton University Press.Snyder, G. H. (1960). Deterrence and power. Journal of Conflict Resolution, 4(2), 163–178. https://doi.org/10.1177/002200276000400201Steinbruner, J. (1976). Beyond Rational Deterrence: The Struggle for New Conceptions. World Politics, 28(2), 223–245. https://doi.org/10.2307/2009891Syeed, N. (12/04/2017). Outer-Space Hacking a Top Concern for nasa’s Cybersecurity Chief. Bloomberg.com. Obtido do website: https://www.bloomberg.com/news/articles/2017-04-12/outer-space-hacking-a-top-concern-for-nasa-scybersecurity-chiefTen, C.-W., Manimaran, G., & Liu, C.-C. (2010). Cybersecurity for Critical Infrastructures: Attack and Defense Modeling. ieee Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans, 40(4), 853–865. https://doi.org/10.1109/tsmca.2010.2048028The White House. (2011). International Strategy for Cyberspace. Obtido do White House website: https://assets.documentcloud.org/documents/2700127/Document-46.pdfThe White House. (2018). National Cyber Strategy of the United States of America. Obtido do Trump White House Archives: https://trumpwhitehouse.archives.gov/wp-content/uploads/2018/09/National-Cyber-Strategy.pdfThucydides. (2009). The Peloponnesian War (M. Hammond, Trans.). Oxford: Oxford University Press. Ventures, C. (2020). 2019 Official Annual Cybercrime Report. Obtido website: https://www.herjavecgroup.com/wp-content/uploads/2018/12/CV-HG-2019-Official-Annual-Cybercrime-Report.pdfVilla, R. A. D. (2006). A segurança internacional no pós-guerra fria: um balanço da teoria tradicional e das novas agendas de pesquisa. Bib: Revista Brasileira de Informação Bibliográfica Em Ciências Sociais, 62(2° semestre), p. 19-31.Von Solms, R., & Van Niekerk, J. (2013). From information security to cyber security. Computers & Security, 38(1), 97–102. https://doi.org/10.1016/j.cose.2013.04.004Walt, S. M. (1991). The Renaissance of Security Studies. International Studies Quarterly, 35(2), 211–239. https://doi.org/10.2307/2600471Wilner, A. (2017). Cyber deterrence and critical-infrastructure protection: Expectation, application, and limitation. Comparative Strategy, 36(4), 309–318. https://doi.org/10.1080/01495933.2017.1361202Wilson, W. (1918). President Woodrow Wilson’s Fourteen Points. Obtido do website: https://avalon.law.yale.edu/20th_century/wilson14.aspWohlstetter, A. (1959). The Delicate Balance of Terror. Foreign Affairs, 37(2), 211–234. https://doi.org/10.2307/20029345Wolfers, A. (1946). The Atomic Bomb and Soviet- American relation. In B. Brodie (Ed.), The Absolute Weapon: Atomic Power and World Order (pp.90–123). New York: Harcourt, Brace and Co.Zetter, K. (2017). Contagem Regressiva Até Zero Day. Rio de Janeiro: Brasport.Cícero Araújo Lisboa , Guilherme Ziebell de Oliveira - 2021info:eu-repo/semantics/openAccesshttp://purl.org/coar/access_right/c_abf2Esta obra está bajo una licencia internacional Creative Commons Atribución-NoComercial-CompartirIgual 4.0.http://creativecommons.org/licenses/by-nc-sa/4.0https://revistas.uexternado.edu.co/index.php/oasis/article/view/7556cyber deterrence,conventional deterrence,cyber security,international securitydisuasión cibernética,disuasión convencional,seguridad cibernética,seguridad internacionaldissuasão cibernética;dissuasão convencional;segurança cibernética;segurança internacionalO Conceito de dissuasão cibernética: relevância e possibilidadesThe concept of cyber dissuasion: relevance and possibilitiesArtículo de revistahttp://purl.org/coar/resource_type/c_6501http://purl.org/coar/resource_type/c_6501http://purl.org/coar/resource_type/c_2df8fbb1http://purl.org/coar/version/c_970fb48d4fbd8a85Textinfo:eu-repo/semantics/articleJournal articlehttp://purl.org/redcol/resource_type/ARTREFinfo:eu-repo/semantics/publishedVersionPublicationOREORE.xmltext/xml2614https://bdigital.uexternado.edu.co/bitstreams/b6b4f7f0-6912-4567-9395-fb8d2682b306/downloadb3dd88d075af582c00a7cd321f45a25dMD51001/8572oai:bdigital.uexternado.edu.co:001/85722023-08-14 15:26:14.909http://creativecommons.org/licenses/by-nc-sa/4.0Cícero Araújo Lisboa , Guilherme Ziebell de Oliveira - 2021https://bdigital.uexternado.edu.coUniversidad Externado de Colombiametabiblioteca@metabiblioteca.org