POLI SCI 345 Lecture Notes - Lecture 9: Security Dilemma, Rationality, Human Security

17 views3 pages

Document Summary

Hard to find who the perpetrator is (attribution) Both sides don"t know each others intention and capabilities. Hackers are always going to find a way in. Gartzke and lindsay say that this is true in small scale attacks but doesn"t hold true in large-scale attacks. Hackers have to exercise restraint because so much can go wrong. The bigger the attack the more likely it is to lose anonymity. Normally there are 3 things you can do: Disarm- taking away computers, access to internet, knowledge. Defense- putting up firewalls, protecting servers, looking for holes. Hard to do all these thing is context of cybersecurity. Hackers can adapt code to attack another way past the defense. Lets attacker through and uses power against them. Take home: no big threat from cyber attack. Use direct violence against citizens and states. Threats to individual security but not national security. Because operations are mainly business and don"t target the government.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers