dc.creatorAraújo Lisboa , Cícero
dc.creatorZiebell de Oliveira, Guilherme
dc.date.accessioned2022-01-01 00:00:00
dc.date.accessioned2022-09-08T13:50:16Z
dc.date.available2022-01-01 00:00:00
dc.date.available2022-09-08T13:50:16Z
dc.date.created2022-01-01 00:00:00
dc.date.created2022-09-08T13:50:16Z
dc.date.issued2021-01-01
dc.identifier10.18601/16577558.n35.04
dc.identifier2346-2132
dc.identifier1657-7558
dc.identifierhttps://bdigital.uexternado.edu.co/handle/001/8572
dc.identifierhttps://doi.org/10.18601/16577558.n35.04
dc.description.abstractEste artículo pretende discutir la posibilidad de aplicar el concepto de disuasión en el ambiente cibernético. En vista de su creciente importancia, el ciberespacio ocupa una dimensión central en las preocupaciones estratégicas de cualquier nación. Ante la posibilidad de conflictos cibernéticos, la reflexión sobre el concepto de disuasión cibernética, así como sobre su relevancia, es fundamental. De esta forma, el trabajo busca discutir el concepto, considerando sus aplicaciones y limitaciones, como también sus principales características, evaluando sus similitudes y diferencias con relación al concepto de disuasión convencional. Tras una discusión sobre el concepto de disuasión y sus particularidades, presenta un análisis de la ciberseguridad, dando especial atención a la discusión de las ciberamenazas. Finalmente, discute la aplicación del concepto de disuasión en el ámbito de la ciberseguridad, demostrando su aplicabilidad y destacando sus principales potenciales y límites.
dc.description.abstractThis article aims to discuss the applicability of the concept of deterrence to the cyberspace. In view of its growing importance, cyberspace occupies a central dimension in the strategic concerns of any nation. Given the possibility of cybernetic conflicts, reflection on the concept of cyber deterrence, as well as its relevance, is essential. Thus, this article seeks to discuss the concept, considering its applications and limitations, as well as its main characteristics, evaluating its similarities and differences in relation to the concept of conventional deterrence. After a discussion on the concept of deterrence and its particularities, it presents an analysis of cybersecurity, paying special attention to the discussion of cyber threats. Finally, it discusses the application of the concept of deterrence in the field of cybersecurity, demonstrating its applicability and highlighting its main potentials and limitations.
dc.languagespa
dc.publisherFacultad de Finanzas, Gobierno y Relaciones Internacionales
dc.relationhttps://revistas.uexternado.edu.co/index.php/oasis/article/download/7556/12040
dc.relationhttps://revistas.uexternado.edu.co/index.php/oasis/article/download/7556/12041
dc.relationhttps://revistas.uexternado.edu.co/index.php/oasis/article/download/7556/12042
dc.relationNúm. 35 , Año 2022 : Enero-Junio
dc.relation78
dc.relation35
dc.relation53
dc.relationOasis
dc.relationABNT. (2015). ABNT NBR ISO/IEC 27032. Tecnologia da Informação - Técnicas de segurança – Diretrizes para segurança cibernética. Brasília: Associação Brasileira de Normas Técnicas
dc.relationAllison, G. T. (1971). Essence of decision: explaining the Cuban missile crisis. Boston: Little, Brown.
dc.relationAngell, N. (1911). The great illusion: a study of the relation of military power in nations to their economic and social advantages. Toronto: Mcclelland and Goodchild.
dc.relationAustralian Government. (2020). Australia’s Cyber Security Strategy 2020. Australian Government Department of Home Affairs. https://www.homeaffairs.gov.au/cyber-security-subsite/files/cyber-security-strategy-2020.pdf
dc.relationBrantly, A. (2018). The Cyber Deterrence Problem. In T. Minárik, R. Jakschis, & L. Lindström (Eds.), 2018 10th International Conference on Cyber Conflict CyCon X: Maximising Effects (pp. 31–54). Tallinn: Nato Cooperative Cyber Defence Centre of Excellence.
dc.relationBrasil. (2014). MD31-M-07 Doutrina Militar de Defesa Cibernética. Obtido do Ministério da Defesa website: https://bdex.eb.mil.br/jspui/bitstream/123456789/136/1/MD31_M07.pdf
dc.relationBrasil. (24/07/2020). Processo de adesão à Convenção de Budapeste - Nota Conjunta do Ministério das Relações Exteriores e do Ministério da Justiça e Segurança Pública. Obtido em 2 de novembro de 2020, do: http://www.itamaraty.gov.br/pt-BR/notas-a-imprensa/21146-processo-de-adesao-aconvencao-de-budapeste-nota-conjunta-do-ministerio-das-relacoes-exteriores-e-do-ministerioda-justica-e-seguranca-publica
dc.relationBrodie, B. (1959). Strategy in the Missile Age. Santa Monica: Rand.
dc.relationBrodie, B. (Ed.). (1946). The Absolute Weapon: Atomic Power and World Order. New York: Harcourt, Brace and Co.
dc.relationCademartor, L. H. U., & Santos, P. C. (2016). A Interdependência Complexa e a Questão dos Direitos Humanos no Contexto das Relações Internacionais. Revista Brasileira de Direito, 12(2), 71–81. https://doi.org/10.18256/2238-0604/revistadedireito.v12n2p71-81
dc.relationClarke, R. A., & Knake, R. (2011). Cyber War. New York: Harpercollins.
dc.relationCornish, P. (2010). Arms control tomorrow: the challenge of nuclear weapons in the twenty-first century. In: R. Niblett (Ed.). America and a Changed World: A Question of Leadership, (pp.223–237).
dc.relationCouncil of Europe. (2014). Convention on Cybercrime. Obtido em 31 de outubro de 2020, do website: https://www.coe.int/en/web/conventions/fulllist/-/conventions/treaty/185/signatures
dc.relationDhillon, G. (2007). Principles of information systems security: text and cases. Hoboken, Nj: Wiley, C.
dc.relationDoffman, Z. (06/05/2019). Israel Responds To Cyber Attack With Air Strike On Cyber Attackers In World First. Obtido em 2 de novembro de 2020, do website: https://www.forbes.com/sites/zakdoffman/2019/05/06/israeli-militarystrikes-and-destroys-hamas-cyber-hq-in-worldfirst/?sh=6a5bfcc7afb5
dc.relationFerraço, R. (2014). cpi Da Espionagem Relatório Final. Obtido do website: https://www12.senado.leg.br/noticias/arquivos/2014/04/04/integra-dorelatorio-de-ferraco
dc.relationGeers, K. (2011). Strategic Cyber Security. Tallinn: NATO Cooperative Cyber Defense Centre of Excellence.
dc.relationGeorge, A. L., & Smoke, R. (1974). Deterrence in American foreign policy: theory and practice. New York: Columbia University Press.
dc.relationGertz, B. (/16/07/2013). U.S., China Conclude Strategic and Economic Dialogue Talks. Obtido em 31 de outubro de 2020 do Washington Free Beacon website: https://freebeacon.com/national-security/u-s-china-conclude-strategicand-conomic-dialogue-talks/
dc.relationGiles, K., & Hagestad, W. (2013, June 1). Divided by a common language: Cyber definitions in Chinese, Russian and English. Obtido em 4 de novembro de 2020 do IEEE Xplore website: https://ieeexplore.ieee.org/abstract/document/6568390
dc.relationGobierno de España. (2019). Estrategia Nacional de Ciberseguridad 2019. Departamento de seguridad nacional. https://www.dsn.gob.es/ca/file/2989/download?token=EuVy2lNr#:~:text=Spain
dc.relationGoodman, W. (2010). Cyber Deterrence: Tougher in Theory than in Practice? Strategic Studies Quarterly, 4(3), 102–135.
dc.relationGray, C. S. (1990). The definitions and assumptions of deterrence: Questions of theory and practice. Journal of Strategic Studies, 13(4), 1–18. https://doi.org/10.1080/01402399008437428
dc.relationGray, C. S. (1999). The second nuclear age. Boulder: Lynne Rienner.
dc.relationHealey, J. (22/02/2012). Beyond Attribution: Seeking National Responsibility in Cyberspace. Obtido em 30 de outubro de 2020 do Atlantic Council website: https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/beyondattribution-seeking-national-responsibility-incyberspace/
dc.relationHughes, W. P., & Girrier, R. (2018). Fleet tactics and naval operations (2a ed.). Annapolis, Maryland: Naval Institute Press.
dc.relationIasiello, E. (2014). Is Cyber Deterrence an Illusory Course of Action? Journal of Strategic Security, 7(1), 54–67. https://doi.org/10.5038/1944-0472.7.1.5
dc.relationIDF, I. D. F. (05/05/2019). Cleared for Release. Obtido em 17 de outubro de 2020 do Twitter: https://twitter.com/IDF/status/1125066395010699264?s=20
dc.relationISO, I. O. for S. (2018). ISO/IEC 27000. Information technology -- Security techniques – Information security management systems -- Overview and vocabulary. ISO - International Organization for Standardization.
dc.relationJanis, I. L. (1982). Groupthink: psychological studies of policy decisions and fiascoes. Boston: Houghton Mifflin.
dc.relationJensen, E. (2012). Cyber Deterrence. Emory International Law Review, 26(2), 773–824. https://digitalcommons.law.byu.edu/faculty_scholarship/231/
dc.relationJervis, R. (1979). Deterrence Theory Revisited. World Politics, 31(2), 289–324. https://doi.org/10.2307/2009945
dc.relationJervis, R., Lebow, R. N., & Stein, J. G. (1985). Psychology and deterrence. Baltimore: Johns Hopkins University Press.
dc.relationKarpavičiūtė, I. (2019). Strategic Stability: It Takes Two to Tango? Lithuanian Annual Strategic Review, 17(1), 97–121. https://doi.org/10.2478/lasr-2019-0004
dc.relationKaspersky. (08/11/2018). O que é uma ameaça persistente avançada (apt)? Obtido em 1º de novembro de 2020, do: www.kaspersky.com.br website: https://www.kaspersky.com.br/resource-center/definitions/advanced-persistent-threats
dc.relationKeohane, R. O., & Nye, J. S. (1977). Power and interdependence: world politics in transition. Boston: Little, Brown.
dc.relationKlimburg, A. (Ed.). (2012). National cyber security framework manual. Tallinn: Nato Cooperative Cyber Defense Centre of Excellence.
dc.relationKnopf, J. W. (2010). The Fourth Wave in Deterrence Research. Contemporary Security Policy, 31(1), 1–33. https://doi.org/10.1080/13523261003640819
dc.relationLewis, J. A. (2009) Fog of Cyberwar: Discouraging Deterrence. Switzerland: International Relations and Security Network.
dc.relationLibicki, M. C. (2009). Cyberdeterrence and cyberwar. Santa Monica, Ca: Rand.
dc.relationLong, A. G. (2008). Deterrence-From Cold War to long war: lessons from six decades of rand research. Santa Monica: rand.
dc.relationLupovici, A. (2010). The Emerging Fourth Wave of Deterrence Theory: Toward a New Research Agenda. International Studies Quarterly, 54(3), 705–732. https://doi.org/10.1111/j.1468-2478.2010.00606.x
dc.relationLynn, W. (2010). Defending a New Domain: The Pentagon’s Cyberstrategy. Foreign Affairs, 89(5), 97–108. https://www.jstor.org/stable/20788647
dc.relationMcKenzie, T. M. (2017). Is cyber deterrence possible? Alabama: Air University Press, Air Force Research Institute.
dc.relationMearsheimer, J. J. (1981). The theory and practice of conventional deterrence (PhD Thesis.; p. 485). Cornell University.
dc.relationMorgan, P. M. (2003). Deterrence now. Cambridge: Cambridge University Press.
dc.relationMuller, R. (2004). The Origins of mad: A Short History of City-Busting. In H. D. Sokolski (Ed.), Getting MAD Nuclear mutual assured destruction, its origins and practice (pp. 15–50). Carlisle: Strategic Studies Institute.
dc.relationMyers, J., & Whiting, K. (2019, January 16). These are the biggest risks facing our world in 2019. Obtido em 27 de outubro de 2020 do World Economic Forum website: https://www.weforum.org/agenda/2019/01/these-are-the-biggest-risksfacing-our-world-in-2019/
dc.relationNewman, L. H. (2019, May 6). What Israel’s Strike on Hamas Hackers Means For Cyberwar. Wired. Retrieved from https://www.wired.com/story/israel-hamas-cyberattack-air-strike-cyberwar/
dc.relationNye, J. (2016). Deterrence and Dissuasion in Cyberspace. Journal of Cyber Policy, 1(2), 44–71. https://doi.org/10.1162/ISEC_a_00266
dc.relationPutten, F.-P. V. D., Meijnders, M., & Rood, J. (2015). Deterrence as a security concept against non-traditional threats (pp. 1–64). Obtido do website: https://www.clingendael.org/sites/default/files/pdfs/deterrence_as_a_security_concept_against_non_traditional_threats.pdf
dc.relationRepública de Colombia. (2016). Política Nacional de Seguridad Digital. Consejo Nacional de Política Económica y Social: https://bibliotecadigital.ccb.org.co/bitstream/handle/11520/14856/DNP-Conpes-Pol%2b%c2%a1tica%20Nacional%20de%20Seguridad%20Digital.pdf?sequence=1&isAllowed=y
dc.relationRyan, N. J. (2017). Five Kinds of Cyber Deterrence. Philosophy & Technology, 31(3), 331–338. https://doi.org/10.1007/s13347-016-0251-1
dc.relationSamson, V., & Weeden, B. (Eds.). (2020). Global Counterspace Capabilities: An Open Source Assessment. Obtido do Secure World Foundation website: https://swfound.org/media/206970/swf_counterspace2020_electronic_final.pdf
dc.relationSchelling, T. C. (1960). The strategy of conflict. Cambridge: Harvard University Press.
dc.relationSchelling, T. C. (1966). Arms and Influence. New Heaven: Yale University Press
dc.relationSêmola, M. (2014). Gestão da Segurança da Informação: uma visão executiva (2ª ed.). Rio de Janeiro: Elsevier.
dc.relationSinger, P. W., & Friedman, A. (2014). Cybersecurity and cyberwar: what everyone needs to know. Oxford: Oxford University Press.
dc.relationSnyder, G. (1961). Deterrence or Defense. Princeton: Princeton University Press.
dc.relationSnyder, G. H. (1960). Deterrence and power. Journal of Conflict Resolution, 4(2), 163–178. https://doi.org/10.1177/002200276000400201
dc.relationSteinbruner, J. (1976). Beyond Rational Deterrence: The Struggle for New Conceptions. World Politics, 28(2), 223–245. https://doi.org/10.2307/2009891
dc.relationSyeed, N. (12/04/2017). Outer-Space Hacking a Top Concern for nasa’s Cybersecurity Chief. Bloomberg.com. Obtido do website: https://www.bloomberg.com/news/articles/2017-04-12/outer-space-hacking-a-top-concern-for-nasa-scybersecurity-chief
dc.relationTen, C.-W., Manimaran, G., & Liu, C.-C. (2010). Cybersecurity for Critical Infrastructures: Attack and Defense Modeling. ieee Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans, 40(4), 853–865. https://doi.org/10.1109/tsmca.2010.2048028
dc.relationThe White House. (2011). International Strategy for Cyberspace. Obtido do White House website: https://assets.documentcloud.org/documents/2700127/Document-46.pdf
dc.relationThe White House. (2018). National Cyber Strategy of the United States of America. Obtido do Trump White House Archives: https://trumpwhitehouse.archives.gov/wp-content/uploads/2018/09/National-Cyber-Strategy.pdf
dc.relationThucydides. (2009). The Peloponnesian War (M. Hammond, Trans.). Oxford: Oxford University Press. Ventures, C. (2020). 2019 Official Annual Cybercrime Report. Obtido website: https://www.herjavecgroup.com/wp-content/uploads/2018/12/CV-HG-2019-Official-Annual-Cybercrime-Report.pdf
dc.relationVilla, R. A. D. (2006). A segurança internacional no pós-guerra fria: um balanço da teoria tradicional e das novas agendas de pesquisa. Bib: Revista Brasileira de Informação Bibliográfica Em Ciências Sociais, 62(2° semestre), p. 19-31.
dc.relationVon Solms, R., & Van Niekerk, J. (2013). From information security to cyber security. Computers & Security, 38(1), 97–102. https://doi.org/10.1016/j.cose.2013.04.004
dc.relationWalt, S. M. (1991). The Renaissance of Security Studies. International Studies Quarterly, 35(2), 211–239. https://doi.org/10.2307/2600471
dc.relationWilner, A. (2017). Cyber deterrence and critical-infrastructure protection: Expectation, application, and limitation. Comparative Strategy, 36(4), 309–318. https://doi.org/10.1080/01495933.2017.1361202
dc.relationWilson, W. (1918). President Woodrow Wilson’s Fourteen Points. Obtido do website: https://avalon.law.yale.edu/20th_century/wilson14.asp
dc.relationWohlstetter, A. (1959). The Delicate Balance of Terror. Foreign Affairs, 37(2), 211–234. https://doi.org/10.2307/20029345
dc.relationWolfers, A. (1946). The Atomic Bomb and Soviet- American relation. In B. Brodie (Ed.), The Absolute Weapon: Atomic Power and World Order (pp.90–123). New York: Harcourt, Brace and Co.
dc.relationZetter, K. (2017). Contagem Regressiva Até Zero Day. Rio de Janeiro: Brasport.
dc.rightsinfo:eu-repo/semantics/openAccess
dc.rightshttp://purl.org/coar/access_right/c_abf2
dc.rightsEsta obra está bajo una licencia internacional Creative Commons Atribución-NoComercial-CompartirIgual 4.0.
dc.rightshttp://creativecommons.org/licenses/by-nc-sa/4.0
dc.rightsCícero Araújo Lisboa , Guilherme Ziebell de Oliveira - 2021
dc.sourcehttps://revistas.uexternado.edu.co/index.php/oasis/article/view/7556
dc.subjectcyber deterrence,
dc.subjectconventional deterrence,
dc.subjectcyber security,
dc.subjectinternational security
dc.subjectdisuasión cibernética,
dc.subjectdisuasión convencional,
dc.subjectseguridad cibernética,
dc.subjectseguridad internacional
dc.subjectdissuasão cibernética;
dc.subjectdissuasão convencional;
dc.subjectsegurança cibernética;
dc.subjectsegurança internacional
dc.titleO Conceito de dissuasão cibernética: relevância e possibilidades
dc.typeArtículo de revista


Este ítem pertenece a la siguiente institución