In a world of increasing dependence on information technology, the prevention of cyberattacks on a nation's important computer and communications systems and networks is a problem that looms large. Given the demonstrated limitations of passive cybersecurity defense measures, it is natural to consider the possibility that deterrence might play a useful role in preventing cyberattacks against the United States and its vital interests. At the request of the Office of the Director of National Intelligence, the National Research Council undertook a two-phase project aimed to foster a broad, multidisciplinary examination of strategies for deterring cyberattacks on the United States and of the possible utility of these strategies for the U.S. government.
The first phase produced a letter report providing basic information needed to understand the nature of the problem and to articulate important questions that can drive research regarding ways of more effectively preventing, discouraging, and inhibiting hostile activity against important U.S. information systems and networks.
The second phase of the project entailed selecting appropriate experts to write papers on questions raised in the letter report. A number of experts, identified by the committee, were commissioned to write these papers under contract with the National Academy of Sciences. Commissioned papers were discussed at a public workshop held June 10-11, 2010, in Washington, D.C., and authors revised their papers after the workshop.
Although the authors were selected and the papers reviewed and discussed by the committee, the individually authored papers do not reflect consensus views of the committee, and the reader should view these papers as offering points of departure that can stimulate further work on the topics discussed. The papers presented in this volume are published essentially as received from the authors, with some proofreading corrections made as limited time allowed.
National Research Council. 2010. Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy. Washington, DC: The National Academies Press.
Sign in to access your saved publications, downloads, and email
preferences.
Former MyNAP users: You'll need to reset your password on your first
login to MyAcademies. Click "Forgot password" below to receive a reset
link via email. Having trouble?
Visit our FAQ page
to contact support.
Members of the National Academy of Sciences, National Academy of
Engineering, or National Academy of Medicine should log in through their
respective Academy portals.
Register
Register
Download as a Guest
Download as a Guest
While logged on as a guest, you can download any of our free PDFs on
nationalacademies.org
. You will remain logged in until you close your browser.
Thank You
Thank You
Thank you for creating a MyAcademies account!
Enjoy free access to thousands of National Academies' publications, a
10% discount off every purchase, and build your personal library.
Forgot Password
Forgot Password
Enter the email address for your MyAcademies (formerly MyNAP) account to
receive password reset instructions.
Reset Requested
Reset Requested
We sent password reset instructions to
your email
. Follow the link in that email to create a new password. Didn't receive
it? Check your spam folder or
contact us
for assistance.
We sent a verification link to your email. Please check your inbox (and
spam folder) and follow the link to verify your email address. If you
did not receive the email, you can request a new verification link below