Factors Determining Cyber Strategy: the Differences Between Active and Passive Cyber Attacks
Abstract
China and Russia have increased their pursuit of using cyber attacks as an offensive tool in overall state strategy. China pursues passive cyber attacks while Russia pursues active cyber attacks. This study intends to answer the question: what factors encourage China and Russia to pursue differing cyber attack strategies? A review of the current literature reveals that four primary factors influence cyber strategy: economic incentive, international hierarchy, institutional organization, and state interpretation of deterrence. These four factors are analyzed through policy analysis, using documents from NGOs, and government documents from the US, China and Russia. The results conclude that each factor contributes significantly to cyber-strategy; however, state interpretation of deterrence is the only factor that adequately explains China's and Russia’s choices in determining cyber strategy. The study discusses the implications of these findings and possible areas for further research.
Collections
Cite this version of the work
Francis William Engli
(2020).
Factors Determining Cyber Strategy: the Differences Between Active and Passive Cyber Attacks. UWSpace.
http://hdl.handle.net/10012/16440
Other formats
Related items
Showing items related by title, author, creator and subject.
-
Application-Based Measures for Developing Cyber-Resilient Control and Protection Schemes in Power Networks
Ameli, Amir (University of Waterloo, 2019-07-04)Electric power systems are a part of the most-crucial infrastructure on which societies depend. In order to operate efficiently and reliably, the physical layer in large electric power networks is coupled with a cyber ... -
Cyber-Physical Resilience Enhancement Strategies for Modern Power Grids
Mohamed, Nancy (University of Waterloo, 2021-09-28)Continuous research efforts are dedicated to developing methods to improve existing security tools to better fit the nature of smart grids. However, there is no perfect security scheme for every potential attack threat. ... -
How We Became Legion: Burke's Identification and Anonymous
Ramos Antunes da Silva, Debora Cristina (University of Waterloo, 2013-08-19)This thesis presents a study of how identification, according to Kenneth Burke's theory, can be observed in the media-related practices promoted by the cyber-activist collective Anonymous. Identification is the capacity ...