Skip to main content
  • 14 Accesses

Abstract

The chapter introduces four themes of the book. First, challenges that are unique to cybersecurity, especially the difficulty of deterring and legally penalizing hackers, impose limits on the ability of states to benefit much from the traditional focus on denial defense and reliance on international rules. Second, political attributes that define states as democratic generate a set of strengths and weaknesses in the defense of their networks. Any cybersecurity strategy they adopt has both dimensions that they need to address. Third, some of the challenges that they face are so great that they have the effects of relatively empowering hacking groups that are part of or sponsored by authoritarian states. Finally, the search for strategic options for democratic states to manage the impact of strategic asymmetry presents two additional strategies to consider—offensive cyber operations and active defense strategy.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 119.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nori Katagiri .

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Katagiri, N. (2024). Introduction. In: How Liberal Democracies Defend Their Cyber Networks from Hackers. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-031-54561-0_1

Download citation

Publish with us

Policies and ethics