{"id":12142,"date":"2016-02-11T14:00:23","date_gmt":"2016-02-11T22:00:23","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=12142"},"modified":"2020-04-21T14:26:38","modified_gmt":"2020-04-21T21:26:38","slug":"the-cybersecurity-canon-cyberdeterrence-and-cyberwar","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2016\/02\/the-cybersecurity-canon-cyberdeterrence-and-cyberwar\/","title":{"rendered":"The Cybersecurity Canon: Cyberdeterrence and Cyberwar"},"content":{"rendered":"<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/12\/cybersec-canon-red-500x218.png\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:43.6%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-11567 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/12\/cybersec-canon-red-500x218-500x218.png\" alt=\"cybersec-canon-red-500x218\" width=\"500\" height=\"218\" srcset=\"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/12\/cybersec-canon-red-500x218.png 500w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/12\/cybersec-canon-red-500x218-230x100.png 230w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/12\/cybersec-canon-red-500x218-92x40.png 92w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p><em>We modeled the Cybersecurity Canon after the Baseball or Rock &amp; Roll Hall-of-Fame, except for cybersecurity books. We have more than 25 books on the initial candidate list, but we are soliciting help from the cybersecurity community to increase the number to be much more than that.\u00a0<a href=\"https:\/\/paloaltonetworks.com\/threat-research\/cybercanon\/nominate-a-book.html\" target=\"_blank\" rel=\"noopener noreferrer\">Please write a review and nominate your favorite<\/a>.\u00a0<\/em><\/p>\n<p><em>The Cybersecurity Canon is a real thing for our community. We have designed it so that you can directly participate in the process. Please do so!<\/em><\/p>\n<p><strong>Book Review by\u00a0<\/strong><a href=\"https:\/\/www.paloaltonetworks.com\/threat-research\/cybercanon\/cyber-security-canon-bios.html\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Canon Committee Member,\u00a0Brian Kelly<\/strong><\/a><strong>:<\/strong>\u00a0<em>Cyberdeterrence and Cyberwar (2009)<\/em>\u00a0by Martin C. Libicki<!--more--><\/p>\n<h3>Executive Summary<\/h3>\n<p>My interest in the Cybersecurity Canon project and appreciation for a common body of knowledge shared amongst professionals can be traced back to my time as an Officer in the Air National Guard.<\/p>\n<p>Each year the Air Force Chief of Staff would issue a \u201c<a href=\"http:\/\/www.af.mil\/AboutUs\/CSAFReadingList\/2010CSAFReadingList.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">reading list<\/a>\u201d; in 2010 <em>Cyberdeterrence and Cyberwar<\/em> by Martin C. Libicki was on the list under Mission, Doctrine and Profession. Back in 2008 Lt. Gen. Robert Elder, Jr., then Commander of Eight Air Force (8AF\/CC), sponsored the study \u201cDefining and Implementing Cyber Command and Cyber Warfare.\u201d This book represents the results of that study. The reading list and, more specifically, this book were meant to inform senior Air Force leaders and decision-makers. The basic message of <em>Cyberdeterrence and Cyberwar<\/em> is: Cyberspace is its own medium with its own rules; thus, deterrence and warfighting tenets established in other media do not necessarily translate reliably into cyberspace.<\/p>\n<h3>Review<\/h3>\n<p>On June 23, 2009, the Secretary of Defense directed the Commander of U.S. Strategic Command to establish a sub-unified command. The United States Cyber Command (USCYBERCOM), as we know it today, is located at Fort Meade, Maryland. The establishment of U.S. Cyber Command marked the ascent of cyberspace as a military domain. This book focuses on policy dimensions of cyberspace and cyberwar: what it means, what it entails, and what threats can defend or deter it.<\/p>\n<p>Libicki\u2019s background is non-cyber national security history and policy, and that knowledge and background will benefit readers unfamiliar with Cold War era concepts as they relate to cyber.<\/p>\n<p><em>Cyberdeterrence and Cyberwar<\/em> is divided into nine chapters. Chapter One covers the introduction and purpose of the book, which clearly is to focus on military policy as it relates to cyberwar. Chapter Two introduces readers to a conceptual framework for cyberdeterrence and cyberwar. It explains external and internal threats and defines cyberattack and cyberdeterrence. Cyberattack is the deliberate disruption or corruption by one state of a system of interest to another, and cyberdeterrence is the capability in cyberspace to do unto others as they would do unto us. Chapter Three asks, \u201cwhy is cyberdeterrence different?\u201d and focuses on analogies to game theory and nuclear deterrence. Foundationally knowing \u201cwho did it\u201d is critical; today we think of it terms of attribution. All decisions, policy or operational, are based on attribution. Chapter Four considers cyberattack and the purpose of the attack. Potential purposes range from \u201coops\u201d to rogue operators and the implications of each. Chapter Five offers a primer for a strategy of response. This chapter has relevance today as the idea of \u201chacking back\u201d or \u201cactive defense\u201d has become a popular concept in the strategy of response. Chapters Six and Seven outline \u201cstrategic\u201d and \u201coperational\u201d cyberwar and offer conclusions on both. Chapter Eight is dedicated to cyberdefense and concludes that deterrence in cyber terms may be too problematic to offer much surcease from cyberattacks. It outlines the goal of cyberdefense to include architecture, strategy and policy. Chapter Nine is simply titled \u201cTricky Terrain\u201d and offers the defend, disarm or deter triangle as an illustration of approaching a threat that cannot be denied. We know now that cyberattacks are a threat that cannot be denied.<\/p>\n<h3>Conclusion<\/h3>\n<p>Much has changed since this monograph was published back in 2009; and, while some cybersecurity experts may not agree with Libicki\u2019s conclusions, we can\u2019t argue the significance this work has as a historical text in the cybersecurity professional\u2019s education. I would recommend <em>Cyberdeterrence and Cyberwar<\/em> for the Cybersecurity Canon. Reading this book in 2016 allows the reader to both compare and contrast Libicki\u2019s conclusions against the backdrop of cyber events that have occurred over the last decade.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We modeled the Cybersecurity Canon after the Baseball or Rock &amp; Roll Hall-of-Fame, except for cybersecurity books. We have more than 25 books on the initial candidate list, but we are soliciting &hellip;<\/p>\n","protected":false},"author":40,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[155,4521],"tags":[1762,1764,251,1763,1765],"coauthors":[1607],"class_list":["post-12142","post","type-post","status-publish","format-standard","hentry","category-cybersecurity-2","category-canon","tag-cyberdeterrence","tag-cyberdeterrence-and-cyberwar","tag-cybersecurity-canon","tag-cyberwar","tag-martin-c-libicki"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/12142","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=12142"}],"version-history":[{"count":3,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/12142\/revisions"}],"predecessor-version":[{"id":109911,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/12142\/revisions\/109911"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=12142"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=12142"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=12142"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=12142"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}