O Conceito de dissuasão cibernética: relevância e possibilidades
Este artículo pretende discutir la posibilidad de aplicar el concepto de disuasión en el ambiente cibernético. En vista de su creciente importancia, el ciberespacio ocupa una dimensión central en las preocupaciones estratégicas de cualquier nación. Ante la posibilidad de conflictos cibernéticos, la...
- Autores:
-
Araújo Lisboa , Cícero
Ziebell de Oliveira, Guilherme
- Tipo de recurso:
- Article of journal
- Fecha de publicación:
- 2021
- Institución:
- Universidad Externado de Colombia
- Repositorio:
- Biblioteca Digital Universidad Externado de Colombia
- Idioma:
- spa
- OAI Identifier:
- oai:bdigital.uexternado.edu.co:001/8572
- Acceso en línea:
- https://bdigital.uexternado.edu.co/handle/001/8572
https://doi.org/10.18601/16577558.n35.04
- Palabra clave:
- cyber deterrence,
conventional deterrence,
cyber security,
international security
disuasión cibernética,
disuasión convencional,
seguridad cibernética,
seguridad internacional
dissuasão cibernética;
dissuasão convencional;
segurança cibernética;
segurança internacional
- Rights
- openAccess
- License
- Cícero Araújo Lisboa , Guilherme Ziebell de Oliveira - 2021
id |
uexternad2_720fabe2a7fb21b75651e99aea916789 |
---|---|
oai_identifier_str |
oai:bdigital.uexternado.edu.co:001/8572 |
network_acronym_str |
uexternad2 |
network_name_str |
Biblioteca Digital Universidad Externado de Colombia |
repository_id_str |
|
dc.title.spa.fl_str_mv |
O Conceito de dissuasão cibernética: relevância e possibilidades |
dc.title.translated.eng.fl_str_mv |
The concept of cyber dissuasion: relevance and possibilities |
title |
O Conceito de dissuasão cibernética: relevância e possibilidades |
spellingShingle |
O Conceito de dissuasão cibernética: relevância e possibilidades cyber deterrence, conventional deterrence, cyber security, international security disuasión cibernética, disuasión convencional, seguridad cibernética, seguridad internacional dissuasão cibernética; dissuasão convencional; segurança cibernética; segurança internacional |
title_short |
O Conceito de dissuasão cibernética: relevância e possibilidades |
title_full |
O Conceito de dissuasão cibernética: relevância e possibilidades |
title_fullStr |
O Conceito de dissuasão cibernética: relevância e possibilidades |
title_full_unstemmed |
O Conceito de dissuasão cibernética: relevância e possibilidades |
title_sort |
O Conceito de dissuasão cibernética: relevância e possibilidades |
dc.creator.fl_str_mv |
Araújo Lisboa , Cícero Ziebell de Oliveira, Guilherme |
dc.contributor.author.spa.fl_str_mv |
Araújo Lisboa , Cícero Ziebell de Oliveira, Guilherme |
dc.subject.eng.fl_str_mv |
cyber deterrence, conventional deterrence, cyber security, international security |
topic |
cyber deterrence, conventional deterrence, cyber security, international security disuasión cibernética, disuasión convencional, seguridad cibernética, seguridad internacional dissuasão cibernética; dissuasão convencional; segurança cibernética; segurança internacional |
dc.subject.spa.fl_str_mv |
disuasión cibernética, disuasión convencional, seguridad cibernética, seguridad internacional dissuasão cibernética; dissuasão convencional; segurança cibernética; segurança internacional |
description |
Este artículo pretende discutir la posibilidad de aplicar el concepto de disuasión en el ambiente cibernético. En vista de su creciente importancia, el ciberespacio ocupa una dimensión central en las preocupaciones estratégicas de cualquier nación. Ante la posibilidad de conflictos cibernéticos, la reflexión sobre el concepto de disuasión cibernética, así como sobre su relevancia, es fundamental. De esta forma, el trabajo busca discutir el concepto, considerando sus aplicaciones y limitaciones, como también sus principales características, evaluando sus similitudes y diferencias con relación al concepto de disuasión convencional. Tras una discusión sobre el concepto de disuasión y sus particularidades, presenta un análisis de la ciberseguridad, dando especial atención a la discusión de las ciberamenazas. Finalmente, discute la aplicación del concepto de disuasión en el ámbito de la ciberseguridad, demostrando su aplicabilidad y destacando sus principales potenciales y límites. |
publishDate |
2021 |
dc.date.issued.none.fl_str_mv |
2021-01-01 |
dc.date.accessioned.none.fl_str_mv |
2022-01-01 00:00:00 2022-09-08T13:50:16Z |
dc.date.available.none.fl_str_mv |
2022-01-01 00:00:00 2022-09-08T13:50:16Z |
dc.type.spa.fl_str_mv |
Artículo de revista |
dc.type.coar.fl_str_mv |
http://purl.org/coar/resource_type/c_2df8fbb1 |
dc.type.coar.spa.fl_str_mv |
http://purl.org/coar/resource_type/c_6501 http://purl.org/coar/resource_type/c_6501 |
dc.type.coarversion.spa.fl_str_mv |
http://purl.org/coar/version/c_970fb48d4fbd8a85 |
dc.type.content.spa.fl_str_mv |
Text |
dc.type.driver.spa.fl_str_mv |
info:eu-repo/semantics/article |
dc.type.local.eng.fl_str_mv |
Journal article |
dc.type.redcol.spa.fl_str_mv |
http://purl.org/redcol/resource_type/ARTREF |
dc.type.version.spa.fl_str_mv |
info:eu-repo/semantics/publishedVersion |
format |
http://purl.org/coar/resource_type/c_6501 |
status_str |
publishedVersion |
dc.identifier.doi.none.fl_str_mv |
10.18601/16577558.n35.04 |
dc.identifier.eissn.none.fl_str_mv |
2346-2132 |
dc.identifier.issn.none.fl_str_mv |
1657-7558 |
dc.identifier.uri.none.fl_str_mv |
https://bdigital.uexternado.edu.co/handle/001/8572 |
dc.identifier.url.none.fl_str_mv |
https://doi.org/10.18601/16577558.n35.04 |
identifier_str_mv |
10.18601/16577558.n35.04 2346-2132 1657-7558 |
url |
https://bdigital.uexternado.edu.co/handle/001/8572 https://doi.org/10.18601/16577558.n35.04 |
dc.language.iso.spa.fl_str_mv |
spa |
language |
spa |
dc.relation.bitstream.none.fl_str_mv |
https://revistas.uexternado.edu.co/index.php/oasis/article/download/7556/12040 https://revistas.uexternado.edu.co/index.php/oasis/article/download/7556/12041 https://revistas.uexternado.edu.co/index.php/oasis/article/download/7556/12042 |
dc.relation.citationedition.spa.fl_str_mv |
Núm. 35 , Año 2022 : Enero-Junio |
dc.relation.citationendpage.none.fl_str_mv |
78 |
dc.relation.citationissue.spa.fl_str_mv |
35 |
dc.relation.citationstartpage.none.fl_str_mv |
53 |
dc.relation.ispartofjournal.spa.fl_str_mv |
Oasis |
dc.relation.references.spa.fl_str_mv |
ABNT. (2015). ABNT NBR ISO/IEC 27032. Tecnologia da Informação - Técnicas de segurança – Diretrizes para segurança cibernética. Brasília: Associação Brasileira de Normas Técnicas Allison, G. T. (1971). Essence of decision: explaining the Cuban missile crisis. Boston: Little, Brown. Angell, N. (1911). The great illusion: a study of the relation of military power in nations to their economic and social advantages. Toronto: Mcclelland and Goodchild. Australian Government. (2020). Australia’s Cyber Security Strategy 2020. Australian Government Department of Home Affairs. https://www.homeaffairs.gov.au/cyber-security-subsite/files/cyber-security-strategy-2020.pdf Brantly, A. (2018). The Cyber Deterrence Problem. In T. Minárik, R. Jakschis, & L. Lindström (Eds.), 2018 10th International Conference on Cyber Conflict CyCon X: Maximising Effects (pp. 31–54). Tallinn: Nato Cooperative Cyber Defence Centre of Excellence. Brasil. (2014). MD31-M-07 Doutrina Militar de Defesa Cibernética. Obtido do Ministério da Defesa website: https://bdex.eb.mil.br/jspui/bitstream/123456789/136/1/MD31_M07.pdf Brasil. (24/07/2020). Processo de adesão à Convenção de Budapeste - Nota Conjunta do Ministério das Relações Exteriores e do Ministério da Justiça e Segurança Pública. Obtido em 2 de novembro de 2020, do: http://www.itamaraty.gov.br/pt-BR/notas-a-imprensa/21146-processo-de-adesao-aconvencao-de-budapeste-nota-conjunta-do-ministerio-das-relacoes-exteriores-e-do-ministerioda-justica-e-seguranca-publica Brodie, B. (1959). Strategy in the Missile Age. Santa Monica: Rand. Brodie, B. (Ed.). (1946). The Absolute Weapon: Atomic Power and World Order. New York: Harcourt, Brace and Co. Cademartor, L. H. U., & Santos, P. C. (2016). A Interdependência Complexa e a Questão dos Direitos Humanos no Contexto das Relações Internacionais. Revista Brasileira de Direito, 12(2), 71–81. https://doi.org/10.18256/2238-0604/revistadedireito.v12n2p71-81 Clarke, R. A., & Knake, R. (2011). Cyber War. New York: Harpercollins. Cornish, P. (2010). Arms control tomorrow: the challenge of nuclear weapons in the twenty-first century. In: R. Niblett (Ed.). America and a Changed World: A Question of Leadership, (pp.223–237). Council of Europe. (2014). Convention on Cybercrime. Obtido em 31 de outubro de 2020, do website: https://www.coe.int/en/web/conventions/fulllist/-/conventions/treaty/185/signatures Dhillon, G. (2007). Principles of information systems security: text and cases. Hoboken, Nj: Wiley, C. Doffman, Z. (06/05/2019). Israel Responds To Cyber Attack With Air Strike On Cyber Attackers In World First. Obtido em 2 de novembro de 2020, do website: https://www.forbes.com/sites/zakdoffman/2019/05/06/israeli-militarystrikes-and-destroys-hamas-cyber-hq-in-worldfirst/?sh=6a5bfcc7afb5 Ferraço, R. (2014). cpi Da Espionagem Relatório Final. Obtido do website: https://www12.senado.leg.br/noticias/arquivos/2014/04/04/integra-dorelatorio-de-ferraco Geers, K. (2011). Strategic Cyber Security. Tallinn: NATO Cooperative Cyber Defense Centre of Excellence. George, A. L., & Smoke, R. (1974). Deterrence in American foreign policy: theory and practice. New York: Columbia University Press. Gertz, B. (/16/07/2013). U.S., China Conclude Strategic and Economic Dialogue Talks. Obtido em 31 de outubro de 2020 do Washington Free Beacon website: https://freebeacon.com/national-security/u-s-china-conclude-strategicand-conomic-dialogue-talks/ Giles, K., & Hagestad, W. (2013, June 1). Divided by a common language: Cyber definitions in Chinese, Russian and English. Obtido em 4 de novembro de 2020 do IEEE Xplore website: https://ieeexplore.ieee.org/abstract/document/6568390 Gobierno de España. (2019). Estrategia Nacional de Ciberseguridad 2019. Departamento de seguridad nacional. https://www.dsn.gob.es/ca/file/2989/download?token=EuVy2lNr#:~:text=Spain Goodman, W. (2010). Cyber Deterrence: Tougher in Theory than in Practice? Strategic Studies Quarterly, 4(3), 102–135. Gray, C. S. (1990). The definitions and assumptions of deterrence: Questions of theory and practice. Journal of Strategic Studies, 13(4), 1–18. https://doi.org/10.1080/01402399008437428 Gray, C. S. (1999). The second nuclear age. Boulder: Lynne Rienner. Healey, J. (22/02/2012). Beyond Attribution: Seeking National Responsibility in Cyberspace. Obtido em 30 de outubro de 2020 do Atlantic Council website: https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/beyondattribution-seeking-national-responsibility-incyberspace/ Hughes, W. P., & Girrier, R. (2018). Fleet tactics and naval operations (2a ed.). Annapolis, Maryland: Naval Institute Press. Iasiello, E. (2014). Is Cyber Deterrence an Illusory Course of Action? Journal of Strategic Security, 7(1), 54–67. https://doi.org/10.5038/1944-0472.7.1.5 IDF, I. D. F. (05/05/2019). Cleared for Release. Obtido em 17 de outubro de 2020 do Twitter: https://twitter.com/IDF/status/1125066395010699264?s=20 ISO, I. O. for S. (2018). ISO/IEC 27000. Information technology -- Security techniques – Information security management systems -- Overview and vocabulary. ISO - International Organization for Standardization. Janis, I. L. (1982). Groupthink: psychological studies of policy decisions and fiascoes. Boston: Houghton Mifflin. Jensen, E. (2012). Cyber Deterrence. Emory International Law Review, 26(2), 773–824. https://digitalcommons.law.byu.edu/faculty_scholarship/231/ Jervis, R. (1979). Deterrence Theory Revisited. World Politics, 31(2), 289–324. https://doi.org/10.2307/2009945 Jervis, R., Lebow, R. N., & Stein, J. G. (1985). Psychology and deterrence. Baltimore: Johns Hopkins University Press. Karpavičiūtė, I. (2019). Strategic Stability: It Takes Two to Tango? Lithuanian Annual Strategic Review, 17(1), 97–121. https://doi.org/10.2478/lasr-2019-0004 Kaspersky. (08/11/2018). O que é uma ameaça persistente avançada (apt)? Obtido em 1º de novembro de 2020, do: www.kaspersky.com.br website: https://www.kaspersky.com.br/resource-center/definitions/advanced-persistent-threats Keohane, R. O., & Nye, J. S. (1977). Power and interdependence: world politics in transition. Boston: Little, Brown. Klimburg, A. (Ed.). (2012). National cyber security framework manual. Tallinn: Nato Cooperative Cyber Defense Centre of Excellence. Knopf, J. W. (2010). The Fourth Wave in Deterrence Research. Contemporary Security Policy, 31(1), 1–33. https://doi.org/10.1080/13523261003640819 Lewis, J. A. (2009) Fog of Cyberwar: Discouraging Deterrence. Switzerland: International Relations and Security Network. Libicki, M. C. (2009). Cyberdeterrence and cyberwar. Santa Monica, Ca: Rand. Long, A. G. (2008). Deterrence-From Cold War to long war: lessons from six decades of rand research. Santa Monica: rand. Lupovici, A. (2010). The Emerging Fourth Wave of Deterrence Theory: Toward a New Research Agenda. International Studies Quarterly, 54(3), 705–732. https://doi.org/10.1111/j.1468-2478.2010.00606.x Lynn, W. (2010). Defending a New Domain: The Pentagon’s Cyberstrategy. Foreign Affairs, 89(5), 97–108. https://www.jstor.org/stable/20788647 McKenzie, T. M. (2017). Is cyber deterrence possible? Alabama: Air University Press, Air Force Research Institute. Mearsheimer, J. J. (1981). The theory and practice of conventional deterrence (PhD Thesis.; p. 485). Cornell University. Morgan, P. M. (2003). Deterrence now. Cambridge: Cambridge University Press. Muller, R. (2004). The Origins of mad: A Short History of City-Busting. In H. D. Sokolski (Ed.), Getting MAD Nuclear mutual assured destruction, its origins and practice (pp. 15–50). Carlisle: Strategic Studies Institute. Myers, J., & Whiting, K. (2019, January 16). These are the biggest risks facing our world in 2019. Obtido em 27 de outubro de 2020 do World Economic Forum website: https://www.weforum.org/agenda/2019/01/these-are-the-biggest-risksfacing-our-world-in-2019/ Newman, L. H. (2019, May 6). What Israel’s Strike on Hamas Hackers Means For Cyberwar. Wired. Retrieved from https://www.wired.com/story/israel-hamas-cyberattack-air-strike-cyberwar/ Nye, J. (2016). Deterrence and Dissuasion in Cyberspace. Journal of Cyber Policy, 1(2), 44–71. https://doi.org/10.1162/ISEC_a_00266 Putten, F.-P. V. D., Meijnders, M., & Rood, J. (2015). Deterrence as a security concept against non-traditional threats (pp. 1–64). Obtido do website: https://www.clingendael.org/sites/default/files/pdfs/deterrence_as_a_security_concept_against_non_traditional_threats.pdf República de Colombia. (2016). Política Nacional de Seguridad Digital. Consejo Nacional de Política Económica y Social: https://bibliotecadigital.ccb.org.co/bitstream/handle/11520/14856/DNP-Conpes-Pol%2b%c2%a1tica%20Nacional%20de%20Seguridad%20Digital.pdf?sequence=1&isAllowed=y Ryan, N. J. (2017). Five Kinds of Cyber Deterrence. Philosophy & Technology, 31(3), 331–338. https://doi.org/10.1007/s13347-016-0251-1 Samson, V., & Weeden, B. (Eds.). (2020). Global Counterspace Capabilities: An Open Source Assessment. Obtido do Secure World Foundation website: https://swfound.org/media/206970/swf_counterspace2020_electronic_final.pdf Schelling, T. C. (1960). The strategy of conflict. Cambridge: Harvard University Press. Schelling, T. C. (1966). Arms and Influence. New Heaven: Yale University Press Sêmola, M. (2014). Gestão da Segurança da Informação: uma visão executiva (2ª ed.). Rio de Janeiro: Elsevier. Singer, P. W., & Friedman, A. (2014). Cybersecurity and cyberwar: what everyone needs to know. Oxford: Oxford University Press. Snyder, G. (1961). Deterrence or Defense. Princeton: Princeton University Press. Snyder, G. H. (1960). Deterrence and power. Journal of Conflict Resolution, 4(2), 163–178. https://doi.org/10.1177/002200276000400201 Steinbruner, J. (1976). Beyond Rational Deterrence: The Struggle for New Conceptions. World Politics, 28(2), 223–245. https://doi.org/10.2307/2009891 Syeed, N. (12/04/2017). Outer-Space Hacking a Top Concern for nasa’s Cybersecurity Chief. Bloomberg.com. Obtido do website: https://www.bloomberg.com/news/articles/2017-04-12/outer-space-hacking-a-top-concern-for-nasa-scybersecurity-chief Ten, C.-W., Manimaran, G., & Liu, C.-C. (2010). Cybersecurity for Critical Infrastructures: Attack and Defense Modeling. ieee Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans, 40(4), 853–865. https://doi.org/10.1109/tsmca.2010.2048028 The White House. (2011). International Strategy for Cyberspace. Obtido do White House website: https://assets.documentcloud.org/documents/2700127/Document-46.pdf The White House. (2018). National Cyber Strategy of the United States of America. Obtido do Trump White House Archives: https://trumpwhitehouse.archives.gov/wp-content/uploads/2018/09/National-Cyber-Strategy.pdf Thucydides. (2009). The Peloponnesian War (M. Hammond, Trans.). Oxford: Oxford University Press. Ventures, C. (2020). 2019 Official Annual Cybercrime Report. Obtido website: https://www.herjavecgroup.com/wp-content/uploads/2018/12/CV-HG-2019-Official-Annual-Cybercrime-Report.pdf Villa, R. A. D. (2006). A segurança internacional no pós-guerra fria: um balanço da teoria tradicional e das novas agendas de pesquisa. Bib: Revista Brasileira de Informação Bibliográfica Em Ciências Sociais, 62(2° semestre), p. 19-31. Von Solms, R., & Van Niekerk, J. (2013). From information security to cyber security. Computers & Security, 38(1), 97–102. https://doi.org/10.1016/j.cose.2013.04.004 Walt, S. M. (1991). The Renaissance of Security Studies. International Studies Quarterly, 35(2), 211–239. https://doi.org/10.2307/2600471 Wilner, A. (2017). Cyber deterrence and critical-infrastructure protection: Expectation, application, and limitation. Comparative Strategy, 36(4), 309–318. https://doi.org/10.1080/01495933.2017.1361202 Wilson, W. (1918). President Woodrow Wilson’s Fourteen Points. Obtido do website: https://avalon.law.yale.edu/20th_century/wilson14.asp Wohlstetter, A. (1959). The Delicate Balance of Terror. Foreign Affairs, 37(2), 211–234. https://doi.org/10.2307/20029345 Wolfers, A. (1946). The Atomic Bomb and Soviet- American relation. In B. Brodie (Ed.), The Absolute Weapon: Atomic Power and World Order (pp.90–123). New York: Harcourt, Brace and Co. Zetter, K. (2017). Contagem Regressiva Até Zero Day. Rio de Janeiro: Brasport. |
dc.rights.spa.fl_str_mv |
Cícero Araújo Lisboa , Guilherme Ziebell de Oliveira - 2021 |
dc.rights.accessrights.spa.fl_str_mv |
info:eu-repo/semantics/openAccess |
dc.rights.coar.spa.fl_str_mv |
http://purl.org/coar/access_right/c_abf2 |
dc.rights.uri.spa.fl_str_mv |
http://creativecommons.org/licenses/by-nc-sa/4.0 |
rights_invalid_str_mv |
Cícero Araújo Lisboa , Guilherme Ziebell de Oliveira - 2021 http://purl.org/coar/access_right/c_abf2 http://creativecommons.org/licenses/by-nc-sa/4.0 |
eu_rights_str_mv |
openAccess |
dc.format.mimetype.spa.fl_str_mv |
application/pdf text/html text/xml |
dc.publisher.spa.fl_str_mv |
Facultad de Finanzas, Gobierno y Relaciones Internacionales |
dc.source.spa.fl_str_mv |
https://revistas.uexternado.edu.co/index.php/oasis/article/view/7556 |
institution |
Universidad Externado de Colombia |
bitstream.url.fl_str_mv |
https://bdigital.uexternado.edu.co/bitstreams/b6b4f7f0-6912-4567-9395-fb8d2682b306/download |
bitstream.checksum.fl_str_mv |
b3dd88d075af582c00a7cd321f45a25d |
bitstream.checksumAlgorithm.fl_str_mv |
MD5 |
repository.name.fl_str_mv |
Universidad Externado de Colombia |
repository.mail.fl_str_mv |
metabiblioteca@metabiblioteca.org |
_version_ |
1814100491123032064 |
spelling |
Araújo Lisboa , Cícero5490c262-a658-43ec-b09c-638664d2d92cZiebell de Oliveira, Guilherme032315d0-5fd9-4018-9685-d28ea5ed9c772022-01-01 00:00:002022-09-08T13:50:16Z2022-01-01 00:00:002022-09-08T13:50:16Z2021-01-01Este artículo pretende discutir la posibilidad de aplicar el concepto de disuasión en el ambiente cibernético. En vista de su creciente importancia, el ciberespacio ocupa una dimensión central en las preocupaciones estratégicas de cualquier nación. Ante la posibilidad de conflictos cibernéticos, la reflexión sobre el concepto de disuasión cibernética, así como sobre su relevancia, es fundamental. De esta forma, el trabajo busca discutir el concepto, considerando sus aplicaciones y limitaciones, como también sus principales características, evaluando sus similitudes y diferencias con relación al concepto de disuasión convencional. Tras una discusión sobre el concepto de disuasión y sus particularidades, presenta un análisis de la ciberseguridad, dando especial atención a la discusión de las ciberamenazas. Finalmente, discute la aplicación del concepto de disuasión en el ámbito de la ciberseguridad, demostrando su aplicabilidad y destacando sus principales potenciales y límites.This article aims to discuss the applicability of the concept of deterrence to the cyberspace. In view of its growing importance, cyberspace occupies a central dimension in the strategic concerns of any nation. Given the possibility of cybernetic conflicts, reflection on the concept of cyber deterrence, as well as its relevance, is essential. Thus, this article seeks to discuss the concept, considering its applications and limitations, as well as its main characteristics, evaluating its similarities and differences in relation to the concept of conventional deterrence. After a discussion on the concept of deterrence and its particularities, it presents an analysis of cybersecurity, paying special attention to the discussion of cyber threats. Finally, it discusses the application of the concept of deterrence in the field of cybersecurity, demonstrating its applicability and highlighting its main potentials and limitations.application/pdftext/htmltext/xml10.18601/16577558.n35.042346-21321657-7558https://bdigital.uexternado.edu.co/handle/001/8572https://doi.org/10.18601/16577558.n35.04spaFacultad de Finanzas, Gobierno y Relaciones Internacionaleshttps://revistas.uexternado.edu.co/index.php/oasis/article/download/7556/12040https://revistas.uexternado.edu.co/index.php/oasis/article/download/7556/12041https://revistas.uexternado.edu.co/index.php/oasis/article/download/7556/12042Núm. 35 , Año 2022 : Enero-Junio783553OasisABNT. (2015). ABNT NBR ISO/IEC 27032. Tecnologia da Informação - Técnicas de segurança – Diretrizes para segurança cibernética. Brasília: Associação Brasileira de Normas TécnicasAllison, G. T. (1971). Essence of decision: explaining the Cuban missile crisis. Boston: Little, Brown.Angell, N. (1911). The great illusion: a study of the relation of military power in nations to their economic and social advantages. Toronto: Mcclelland and Goodchild.Australian Government. (2020). Australia’s Cyber Security Strategy 2020. Australian Government Department of Home Affairs. https://www.homeaffairs.gov.au/cyber-security-subsite/files/cyber-security-strategy-2020.pdfBrantly, A. (2018). The Cyber Deterrence Problem. In T. Minárik, R. Jakschis, & L. Lindström (Eds.), 2018 10th International Conference on Cyber Conflict CyCon X: Maximising Effects (pp. 31–54). Tallinn: Nato Cooperative Cyber Defence Centre of Excellence.Brasil. (2014). MD31-M-07 Doutrina Militar de Defesa Cibernética. Obtido do Ministério da Defesa website: https://bdex.eb.mil.br/jspui/bitstream/123456789/136/1/MD31_M07.pdfBrasil. (24/07/2020). Processo de adesão à Convenção de Budapeste - Nota Conjunta do Ministério das Relações Exteriores e do Ministério da Justiça e Segurança Pública. Obtido em 2 de novembro de 2020, do: http://www.itamaraty.gov.br/pt-BR/notas-a-imprensa/21146-processo-de-adesao-aconvencao-de-budapeste-nota-conjunta-do-ministerio-das-relacoes-exteriores-e-do-ministerioda-justica-e-seguranca-publicaBrodie, B. (1959). Strategy in the Missile Age. Santa Monica: Rand.Brodie, B. (Ed.). (1946). The Absolute Weapon: Atomic Power and World Order. New York: Harcourt, Brace and Co.Cademartor, L. H. U., & Santos, P. C. (2016). A Interdependência Complexa e a Questão dos Direitos Humanos no Contexto das Relações Internacionais. Revista Brasileira de Direito, 12(2), 71–81. https://doi.org/10.18256/2238-0604/revistadedireito.v12n2p71-81Clarke, R. A., & Knake, R. (2011). Cyber War. New York: Harpercollins.Cornish, P. (2010). Arms control tomorrow: the challenge of nuclear weapons in the twenty-first century. In: R. Niblett (Ed.). America and a Changed World: A Question of Leadership, (pp.223–237).Council of Europe. (2014). Convention on Cybercrime. Obtido em 31 de outubro de 2020, do website: https://www.coe.int/en/web/conventions/fulllist/-/conventions/treaty/185/signaturesDhillon, G. (2007). Principles of information systems security: text and cases. Hoboken, Nj: Wiley, C.Doffman, Z. (06/05/2019). Israel Responds To Cyber Attack With Air Strike On Cyber Attackers In World First. Obtido em 2 de novembro de 2020, do website: https://www.forbes.com/sites/zakdoffman/2019/05/06/israeli-militarystrikes-and-destroys-hamas-cyber-hq-in-worldfirst/?sh=6a5bfcc7afb5Ferraço, R. (2014). cpi Da Espionagem Relatório Final. Obtido do website: https://www12.senado.leg.br/noticias/arquivos/2014/04/04/integra-dorelatorio-de-ferracoGeers, K. (2011). Strategic Cyber Security. Tallinn: NATO Cooperative Cyber Defense Centre of Excellence.George, A. L., & Smoke, R. (1974). Deterrence in American foreign policy: theory and practice. New York: Columbia University Press.Gertz, B. (/16/07/2013). U.S., China Conclude Strategic and Economic Dialogue Talks. Obtido em 31 de outubro de 2020 do Washington Free Beacon website: https://freebeacon.com/national-security/u-s-china-conclude-strategicand-conomic-dialogue-talks/Giles, K., & Hagestad, W. (2013, June 1). Divided by a common language: Cyber definitions in Chinese, Russian and English. Obtido em 4 de novembro de 2020 do IEEE Xplore website: https://ieeexplore.ieee.org/abstract/document/6568390Gobierno de España. (2019). Estrategia Nacional de Ciberseguridad 2019. Departamento de seguridad nacional. https://www.dsn.gob.es/ca/file/2989/download?token=EuVy2lNr#:~:text=SpainGoodman, W. (2010). Cyber Deterrence: Tougher in Theory than in Practice? Strategic Studies Quarterly, 4(3), 102–135.Gray, C. S. (1990). The definitions and assumptions of deterrence: Questions of theory and practice. Journal of Strategic Studies, 13(4), 1–18. https://doi.org/10.1080/01402399008437428Gray, C. S. (1999). The second nuclear age. Boulder: Lynne Rienner.Healey, J. (22/02/2012). Beyond Attribution: Seeking National Responsibility in Cyberspace. Obtido em 30 de outubro de 2020 do Atlantic Council website: https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/beyondattribution-seeking-national-responsibility-incyberspace/Hughes, W. P., & Girrier, R. (2018). Fleet tactics and naval operations (2a ed.). Annapolis, Maryland: Naval Institute Press.Iasiello, E. (2014). Is Cyber Deterrence an Illusory Course of Action? Journal of Strategic Security, 7(1), 54–67. https://doi.org/10.5038/1944-0472.7.1.5IDF, I. D. F. (05/05/2019). Cleared for Release. Obtido em 17 de outubro de 2020 do Twitter: https://twitter.com/IDF/status/1125066395010699264?s=20ISO, I. O. for S. (2018). ISO/IEC 27000. Information technology -- Security techniques – Information security management systems -- Overview and vocabulary. ISO - International Organization for Standardization.Janis, I. L. (1982). Groupthink: psychological studies of policy decisions and fiascoes. Boston: Houghton Mifflin.Jensen, E. (2012). Cyber Deterrence. Emory International Law Review, 26(2), 773–824. https://digitalcommons.law.byu.edu/faculty_scholarship/231/Jervis, R. (1979). Deterrence Theory Revisited. World Politics, 31(2), 289–324. https://doi.org/10.2307/2009945Jervis, R., Lebow, R. N., & Stein, J. G. (1985). Psychology and deterrence. Baltimore: Johns Hopkins University Press.Karpavičiūtė, I. (2019). Strategic Stability: It Takes Two to Tango? Lithuanian Annual Strategic Review, 17(1), 97–121. https://doi.org/10.2478/lasr-2019-0004Kaspersky. (08/11/2018). O que é uma ameaça persistente avançada (apt)? Obtido em 1º de novembro de 2020, do: www.kaspersky.com.br website: https://www.kaspersky.com.br/resource-center/definitions/advanced-persistent-threatsKeohane, R. O., & Nye, J. S. (1977). Power and interdependence: world politics in transition. Boston: Little, Brown.Klimburg, A. (Ed.). (2012). National cyber security framework manual. Tallinn: Nato Cooperative Cyber Defense Centre of Excellence.Knopf, J. W. (2010). The Fourth Wave in Deterrence Research. Contemporary Security Policy, 31(1), 1–33. https://doi.org/10.1080/13523261003640819Lewis, J. A. (2009) Fog of Cyberwar: Discouraging Deterrence. Switzerland: International Relations and Security Network.Libicki, M. C. (2009). Cyberdeterrence and cyberwar. Santa Monica, Ca: Rand.Long, A. G. (2008). Deterrence-From Cold War to long war: lessons from six decades of rand research. Santa Monica: rand.Lupovici, A. (2010). The Emerging Fourth Wave of Deterrence Theory: Toward a New Research Agenda. International Studies Quarterly, 54(3), 705–732. https://doi.org/10.1111/j.1468-2478.2010.00606.xLynn, W. (2010). Defending a New Domain: The Pentagon’s Cyberstrategy. Foreign Affairs, 89(5), 97–108. https://www.jstor.org/stable/20788647McKenzie, T. M. (2017). Is cyber deterrence possible? Alabama: Air University Press, Air Force Research Institute.Mearsheimer, J. J. (1981). The theory and practice of conventional deterrence (PhD Thesis.; p. 485). Cornell University.Morgan, P. M. (2003). Deterrence now. Cambridge: Cambridge University Press.Muller, R. (2004). The Origins of mad: A Short History of City-Busting. In H. D. Sokolski (Ed.), Getting MAD Nuclear mutual assured destruction, its origins and practice (pp. 15–50). Carlisle: Strategic Studies Institute.Myers, J., & Whiting, K. (2019, January 16). These are the biggest risks facing our world in 2019. Obtido em 27 de outubro de 2020 do World Economic Forum website: https://www.weforum.org/agenda/2019/01/these-are-the-biggest-risksfacing-our-world-in-2019/Newman, L. H. (2019, May 6). What Israel’s Strike on Hamas Hackers Means For Cyberwar. Wired. Retrieved from https://www.wired.com/story/israel-hamas-cyberattack-air-strike-cyberwar/Nye, J. (2016). Deterrence and Dissuasion in Cyberspace. Journal of Cyber Policy, 1(2), 44–71. https://doi.org/10.1162/ISEC_a_00266Putten, F.-P. V. D., Meijnders, M., & Rood, J. (2015). Deterrence as a security concept against non-traditional threats (pp. 1–64). Obtido do website: https://www.clingendael.org/sites/default/files/pdfs/deterrence_as_a_security_concept_against_non_traditional_threats.pdfRepública de Colombia. (2016). Política Nacional de Seguridad Digital. Consejo Nacional de Política Económica y Social: https://bibliotecadigital.ccb.org.co/bitstream/handle/11520/14856/DNP-Conpes-Pol%2b%c2%a1tica%20Nacional%20de%20Seguridad%20Digital.pdf?sequence=1&isAllowed=yRyan, N. J. (2017). Five Kinds of Cyber Deterrence. Philosophy & Technology, 31(3), 331–338. https://doi.org/10.1007/s13347-016-0251-1Samson, V., & Weeden, B. (Eds.). (2020). Global Counterspace Capabilities: An Open Source Assessment. Obtido do Secure World Foundation website: https://swfound.org/media/206970/swf_counterspace2020_electronic_final.pdfSchelling, T. C. (1960). The strategy of conflict. Cambridge: Harvard University Press.Schelling, T. C. (1966). Arms and Influence. New Heaven: Yale University PressSêmola, M. (2014). Gestão da Segurança da Informação: uma visão executiva (2ª ed.). Rio de Janeiro: Elsevier.Singer, P. W., & Friedman, A. (2014). Cybersecurity and cyberwar: what everyone needs to know. Oxford: Oxford University Press.Snyder, G. (1961). Deterrence or Defense. Princeton: Princeton University Press.Snyder, G. H. (1960). Deterrence and power. Journal of Conflict Resolution, 4(2), 163–178. https://doi.org/10.1177/002200276000400201Steinbruner, J. (1976). Beyond Rational Deterrence: The Struggle for New Conceptions. World Politics, 28(2), 223–245. https://doi.org/10.2307/2009891Syeed, N. (12/04/2017). Outer-Space Hacking a Top Concern for nasa’s Cybersecurity Chief. Bloomberg.com. Obtido do website: https://www.bloomberg.com/news/articles/2017-04-12/outer-space-hacking-a-top-concern-for-nasa-scybersecurity-chiefTen, C.-W., Manimaran, G., & Liu, C.-C. (2010). Cybersecurity for Critical Infrastructures: Attack and Defense Modeling. ieee Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans, 40(4), 853–865. https://doi.org/10.1109/tsmca.2010.2048028The White House. (2011). International Strategy for Cyberspace. Obtido do White House website: https://assets.documentcloud.org/documents/2700127/Document-46.pdfThe White House. (2018). National Cyber Strategy of the United States of America. Obtido do Trump White House Archives: https://trumpwhitehouse.archives.gov/wp-content/uploads/2018/09/National-Cyber-Strategy.pdfThucydides. (2009). The Peloponnesian War (M. Hammond, Trans.). Oxford: Oxford University Press. Ventures, C. (2020). 2019 Official Annual Cybercrime Report. Obtido website: https://www.herjavecgroup.com/wp-content/uploads/2018/12/CV-HG-2019-Official-Annual-Cybercrime-Report.pdfVilla, R. A. D. (2006). A segurança internacional no pós-guerra fria: um balanço da teoria tradicional e das novas agendas de pesquisa. Bib: Revista Brasileira de Informação Bibliográfica Em Ciências Sociais, 62(2° semestre), p. 19-31.Von Solms, R., & Van Niekerk, J. (2013). From information security to cyber security. Computers & Security, 38(1), 97–102. https://doi.org/10.1016/j.cose.2013.04.004Walt, S. M. (1991). The Renaissance of Security Studies. International Studies Quarterly, 35(2), 211–239. https://doi.org/10.2307/2600471Wilner, A. (2017). Cyber deterrence and critical-infrastructure protection: Expectation, application, and limitation. Comparative Strategy, 36(4), 309–318. https://doi.org/10.1080/01495933.2017.1361202Wilson, W. (1918). President Woodrow Wilson’s Fourteen Points. Obtido do website: https://avalon.law.yale.edu/20th_century/wilson14.aspWohlstetter, A. (1959). The Delicate Balance of Terror. Foreign Affairs, 37(2), 211–234. https://doi.org/10.2307/20029345Wolfers, A. (1946). The Atomic Bomb and Soviet- American relation. In B. Brodie (Ed.), The Absolute Weapon: Atomic Power and World Order (pp.90–123). New York: Harcourt, Brace and Co.Zetter, K. (2017). Contagem Regressiva Até Zero Day. Rio de Janeiro: Brasport.Cícero Araújo Lisboa , Guilherme Ziebell de Oliveira - 2021info:eu-repo/semantics/openAccesshttp://purl.org/coar/access_right/c_abf2Esta obra está bajo una licencia internacional Creative Commons Atribución-NoComercial-CompartirIgual 4.0.http://creativecommons.org/licenses/by-nc-sa/4.0https://revistas.uexternado.edu.co/index.php/oasis/article/view/7556cyber deterrence,conventional deterrence,cyber security,international securitydisuasión cibernética,disuasión convencional,seguridad cibernética,seguridad internacionaldissuasão cibernética;dissuasão convencional;segurança cibernética;segurança internacionalO Conceito de dissuasão cibernética: relevância e possibilidadesThe concept of cyber dissuasion: relevance and possibilitiesArtículo de revistahttp://purl.org/coar/resource_type/c_6501http://purl.org/coar/resource_type/c_6501http://purl.org/coar/resource_type/c_2df8fbb1http://purl.org/coar/version/c_970fb48d4fbd8a85Textinfo:eu-repo/semantics/articleJournal articlehttp://purl.org/redcol/resource_type/ARTREFinfo:eu-repo/semantics/publishedVersionPublicationOREORE.xmltext/xml2614https://bdigital.uexternado.edu.co/bitstreams/b6b4f7f0-6912-4567-9395-fb8d2682b306/downloadb3dd88d075af582c00a7cd321f45a25dMD51001/8572oai:bdigital.uexternado.edu.co:001/85722023-08-14 15:26:14.909http://creativecommons.org/licenses/by-nc-sa/4.0Cícero Araújo Lisboa , Guilherme Ziebell de Oliveira - 2021https://bdigital.uexternado.edu.coUniversidad Externado de Colombiametabiblioteca@metabiblioteca.org |