Talk With an Expert

Solution Architecture for Cyber Deterrence

Solution Architecture for Cyber Deterrence (PDF, 9.62MB)Published: 29 Apr, 2010
Created by:
Thomas Mowbray

For a government cyber deterrence strategy to be effective, it must have network penetration tools, as well as, tools for distributed denial of service (DDOS), parallel scanning, reconnaissance, surveillance, and other capabilities. Most importantly, it must be able to assess cyber-attack attribution rapidly, and with certainty. This paper furthers the definition of cyber-deterrence architectures and evaluates of elements of future architectures in a penetration testing environment. Leveraging available policy research, a line-of-sight analysis is conducted from strategic goals to pen testing source code, filling in important architectural gaps. Policy implications of the proposed technical solutions are discussed. Cyber-deterrence capabilities are assessed at strategic and technical levels, technologies are envisioned that provide components of the solution, and the results are documented as conceptual architecture with research prototypes.