Deterring Cybertrespass and Securing Cyberspace: Lessons from United States Border Control Strategies
Dr Mary Manjikian
Letort Paper by US Army War College, Strategic Studies Institute, US Army War College Press
"In recent years, analysts have begun discussing strategies for securing entities in cyberspace—including the files and software belonging to corporations, government institutions, and private individuals. Increasingly, analysts have suggested utilizing two types of deterrence strategies: deterrence by denial and deterrence by punishment. In determining how both deterrence strategies might be applied to preventing hostile individuals, states, and nonstate actors from entering cyberspace and inflicting damage there, analysts have borrowed from deterrence strategies that have been framed for a variety of other situations..."