![lighthouse](https://wikidafoos.ir/images/article/1266/Screenshot_2024-06-22-22-21-32-948_com.miui.gallery.jpg)
تئوری بازدارندگی بیان می کند که اگر هزینه های جنگ بسیار بیشتر از منافع آن باشد، ثبات جهان را می توان حفظ کرد. سلاحها و استراتژیهایی که دفاع را ارزانتر و حمله را پرهزینهتر میکنند، احتمال درگیری را کاهش میدهند. از این رو، سلاحهای هستهای ممکن است به ایجاد ثبات در جنگ سرد از طریق هزینههای مربوط به پرتاب اول کمک کرده باشند؛ بر اساس این استدلال، جنگ بین ایالات متحده و اتحاد جماهیر شوروی هرگز رخ نداد زیرا قیمت جنگ (یعنی تخریب متقابل) بسیار بالا بود.
این مقاله نظری این استدلال را به حملات سایبری بسط میدهد و بیان میکند که برای حفظ امنیت فناوری اطلاعات یک کشور، سیستمهای دفاع سایبری مطابق با نظریه بازدارندگی باید معرفی شوند. حملات سایبری در حال افزایش هستند زیرا ارزان و آسان بوده و شناسایی آن ها سخت است. مهاجمان نیازی به صرف زمان یا پول زیادی برای یادگیری نحوه نفوذ به کامپیوتر ندارند. به این ترتیب، دلسرد کردن چنین رفتاری دشوار است.
- Ahmad, R., & Yunos, Z. (2012). A dynamic cyber terrorism framework. International Journal of Computer Science and Information Security, 10(2), 149–158. Alford, L. D. (2001). Cyber warfare: A new doctrine and taxonomy. Journal of Defense Software Engineering, 14(4), 27–30. Alperovitch, D. (2010). Revealed: Operation shady RAT. An investigation of targeted intrusions into 70+ global companies, governments and non-profit organizations during the last 5 years. McAfee White Paper. Baker, S., et al. (2010). In the crossfire. Critical infrastructure in the age of cyber war. McAfee Report. Billo, C., Chang, W. (2004). Cyber warfare. An analysis of the means and motivations of selected nation states. Institute for Security Technology Studies at Dartmouth College. Cabinet Office of the United Kingdom. (2011). Cyber Security Strategy of the United Kingdom. Clarke, R., & Knake, R. (2010). Cyber War: The next threat to national security and what to do about it. New York: HarperCollins. Cornish, et al. (2009). Cyberspace and the national security of the United Kingdom. Threats and responses. London: Chatham House Report. CSIS. (2011). Selected bibliography for cyber security. http://csis.org/publication/ selectedbibliography-cyber-security Cull, N. J. (2011). WikiLeaks, public diplomacy 2.0 and the state of digital public diplomacy. Place Branding and Public Diplomacy, 7(1), 1–8. Dartnell, M. (2003). Weapons of mass instruction: Web activism and the transformation of global security. Millennium, 32(3), 477–499. Davies, S. (2011). Infrastructure cyber attack threat grows. Engineering and Technology Magazine, 6(6). Retrieved June 2012 from http://eandt.theiet.org/magazine/2011/06/ outof-control.cfm Deibert, R. J. (2003). Black code: Censorship, surveillance, and the militarization of cyberspace. Millennium, 32(3), 501–530. DeYoung, K., Ellen N. (2012). U.S. uses Yemeni Web sites to counter al-Qaeda propaganda. The Washington Post, May 24, 2012. Retrieved June 2012 from http://www.washingtonpost.com/world/ national-security/us-hacks-web-sites-of-al-qaedaaffiliate-in-yemen/2012/05/23/gJQAGnOxlU_ story.html. Denning, D. (2000). Hacktivism: an emerging threat to diplomacy. American Foreign Service Association. Retrieved from http://www.fsjournal.org/sept00/Denning.cfm
- Ahmad, R., & Yunos, Z. (2012). A dynamic cyber terrorism framework. International Journal of Computer Science and Information Security, 10(2), 149–158. Alford, L. D. (2001). Cyber warfare: A new doctrine and taxonomy. Journal of Defense Software Engineering, 14(4), 27–30. Alperovitch, D. (2010). Revealed: Operation shady RAT. An investigation of targeted intrusions into 70+ global companies, governments and non-profit organizations during the last 5 years. McAfee White Paper. Baker, S., et al. (2010). In the crossfire. Critical infrastructure in the age of cyber war. McAfee Report. Billo, C., Chang, W. (2004). Cyber warfare. An analysis of the means and motivations of selected nation states. Institute for Security Technology Studies at Dartmouth College. Cabinet Office of the United Kingdom. (2011). Cyber Security Strategy of the United Kingdom. Clarke, R., & Knake, R. (2010). Cyber War: The next threat to national security and what to do about it. New York: HarperCollins. Cornish, et al. (2009). Cyberspace and the national security of the United Kingdom. Threats and responses. London: Chatham House Report. CSIS. (2011). Selected bibliography for cyber security. http://csis.org/publication/ selectedbibliography-cyber-security Cull, N. J. (2011). WikiLeaks, public diplomacy 2.0 and the state of digital public diplomacy. Place Branding and Public Diplomacy, 7(1), 1–8. Dartnell, M. (2003). Weapons of mass instruction: Web activism and the transformation of global security. Millennium, 32(3), 477–499. Davies, S. (2011). Infrastructure cyber attack threat grows. Engineering and Technology Magazine, 6(6). Retrieved June 2012 from http://eandt.theiet.org/magazine/2011/06/ outof-control.cfm Deibert, R. J. (2003). Black code: Censorship, surveillance, and the militarization of cyberspace. Millennium, 32(3), 501–530. DeYoung, K., Ellen N. (2012). U.S. uses Yemeni Web sites to counter al-Qaeda propaganda. The Washington Post, May 24, 2012. Retrieved June 2012 from http://www.washingtonpost.com/world/ national-security/us-hacks-web-sites-of-al-qaedaaffiliate-in-yemen/2012/05/23/gJQAGnOxlU_ story.html. Denning, D. (2000). Hacktivism: an emerging threat to diplomacy. American Foreign Service Association. Retrieved from http://www.fsjournal.org/sept00/Denning.cfm
- Kremer, J.F. Müller, B. Cyberspace and International Relations: Theory, Prospects and Challenges. University of Bonnـ Springer Berlin Heidelberg, 2013.