Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy (2010)

Chapter: Categorizing and Understanding Offensive Cyber Capabilities and Their Use--Gregory Rattray and Jason Healey

Previous Chapter: Applicability of Traditional Deterrence Concepts and Theory to the Cyber Realm--Patrick M. Morgan
Suggested Citation: "Categorizing and Understanding Offensive Cyber Capabilities and Their Use--Gregory Rattray and Jason Healey." National Research Council. 2010. Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy. Washington, DC: The National Academies Press. doi: 10.17226/12997.
Page 77
Suggested Citation: "Categorizing and Understanding Offensive Cyber Capabilities and Their Use--Gregory Rattray and Jason Healey." National Research Council. 2010. Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy. Washington, DC: The National Academies Press. doi: 10.17226/12997.
Page 78
Suggested Citation: "Categorizing and Understanding Offensive Cyber Capabilities and Their Use--Gregory Rattray and Jason Healey." National Research Council. 2010. Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy. Washington, DC: The National Academies Press. doi: 10.17226/12997.
Page 79
Suggested Citation: "Categorizing and Understanding Offensive Cyber Capabilities and Their Use--Gregory Rattray and Jason Healey." National Research Council. 2010. Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy. Washington, DC: The National Academies Press. doi: 10.17226/12997.
Page 80
Suggested Citation: "Categorizing and Understanding Offensive Cyber Capabilities and Their Use--Gregory Rattray and Jason Healey." National Research Council. 2010. Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy. Washington, DC: The National Academies Press. doi: 10.17226/12997.
Page 81
Suggested Citation: "Categorizing and Understanding Offensive Cyber Capabilities and Their Use--Gregory Rattray and Jason Healey." National Research Council. 2010. Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy. Washington, DC: The National Academies Press. doi: 10.17226/12997.
Page 82
Suggested Citation: "Categorizing and Understanding Offensive Cyber Capabilities and Their Use--Gregory Rattray and Jason Healey." National Research Council. 2010. Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy. Washington, DC: The National Academies Press. doi: 10.17226/12997.
Page 83
Suggested Citation: "Categorizing and Understanding Offensive Cyber Capabilities and Their Use--Gregory Rattray and Jason Healey." National Research Council. 2010. Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy. Washington, DC: The National Academies Press. doi: 10.17226/12997.
Page 84
Suggested Citation: "Categorizing and Understanding Offensive Cyber Capabilities and Their Use--Gregory Rattray and Jason Healey." National Research Council. 2010. Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy. Washington, DC: The National Academies Press. doi: 10.17226/12997.
Page 85
Suggested Citation: "Categorizing and Understanding Offensive Cyber Capabilities and Their Use--Gregory Rattray and Jason Healey." National Research Council. 2010. Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy. Washington, DC: The National Academies Press. doi: 10.17226/12997.
Page 86
Suggested Citation: "Categorizing and Understanding Offensive Cyber Capabilities and Their Use--Gregory Rattray and Jason Healey." National Research Council. 2010. Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy. Washington, DC: The National Academies Press. doi: 10.17226/12997.
Page 87
Suggested Citation: "Categorizing and Understanding Offensive Cyber Capabilities and Their Use--Gregory Rattray and Jason Healey." National Research Council. 2010. Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy. Washington, DC: The National Academies Press. doi: 10.17226/12997.
Page 88
Suggested Citation: "Categorizing and Understanding Offensive Cyber Capabilities and Their Use--Gregory Rattray and Jason Healey." National Research Council. 2010. Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy. Washington, DC: The National Academies Press. doi: 10.17226/12997.
Page 89
Suggested Citation: "Categorizing and Understanding Offensive Cyber Capabilities and Their Use--Gregory Rattray and Jason Healey." National Research Council. 2010. Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy. Washington, DC: The National Academies Press. doi: 10.17226/12997.
Page 90
Suggested Citation: "Categorizing and Understanding Offensive Cyber Capabilities and Their Use--Gregory Rattray and Jason Healey." National Research Council. 2010. Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy. Washington, DC: The National Academies Press. doi: 10.17226/12997.
Page 91
Suggested Citation: "Categorizing and Understanding Offensive Cyber Capabilities and Their Use--Gregory Rattray and Jason Healey." National Research Council. 2010. Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy. Washington, DC: The National Academies Press. doi: 10.17226/12997.
Page 92
Suggested Citation: "Categorizing and Understanding Offensive Cyber Capabilities and Their Use--Gregory Rattray and Jason Healey." National Research Council. 2010. Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy. Washington, DC: The National Academies Press. doi: 10.17226/12997.
Page 93
Suggested Citation: "Categorizing and Understanding Offensive Cyber Capabilities and Their Use--Gregory Rattray and Jason Healey." National Research Council. 2010. Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy. Washington, DC: The National Academies Press. doi: 10.17226/12997.
Page 94
Suggested Citation: "Categorizing and Understanding Offensive Cyber Capabilities and Their Use--Gregory Rattray and Jason Healey." National Research Council. 2010. Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy. Washington, DC: The National Academies Press. doi: 10.17226/12997.
Page 95
Suggested Citation: "Categorizing and Understanding Offensive Cyber Capabilities and Their Use--Gregory Rattray and Jason Healey." National Research Council. 2010. Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy. Washington, DC: The National Academies Press. doi: 10.17226/12997.
Page 96
Suggested Citation: "Categorizing and Understanding Offensive Cyber Capabilities and Their Use--Gregory Rattray and Jason Healey." National Research Council. 2010. Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy. Washington, DC: The National Academies Press. doi: 10.17226/12997.
Page 97
Suggested Citation: "Categorizing and Understanding Offensive Cyber Capabilities and Their Use--Gregory Rattray and Jason Healey." National Research Council. 2010. Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy. Washington, DC: The National Academies Press. doi: 10.17226/12997.
Page 98
Next Chapter: A Framework for Thinking About Cyber Conflict and Cyber Deterrence with Possible Declaratory Policies for These Domains--Stephen J. Lukasik
Subscribe to Email from the National Academies
Keep up with all of the activities, publications, and events by subscribing to free updates by email.