Preprints are early versions of research articles that have not been peer reviewed. They should not be regarded as conclusive and should not be reported in news media as established information.
Deterrence_by_Denial_approach_for_the_most_known_State_Cyber_Vulnerabilities_.pdf (416.58 kB)
Download file

Deterrence by Denial approach for the most known State Cyber Vulnerabilities

Download (416.58 kB)
posted on 2020-06-17, 16:22 authored by Nasser AlAzwaniNasser AlAzwani, Tom ChenTom Chen
Cyber deterrence by denial strategy can be practised by the state by making it hard for adversaries to succeed any attempt of attacking. It was practised during nuclear deterrence strategies as well as in many other conventional deterrence. This paper argues the functionality of cyber deterrence by denial in deterring cyber threats. In this paper, our attempt is to define cyber deterrence by denial, model it, explore operational roles of cyber security technologies in approaching deterrence by denial within cyber space. Model analysis shed lights over practicing deterrence by denial and its vital role in understanding how efficiently denial can work in maximize failure of any attack which will impact in maximizing cost of cyber attacks to the attacker. Due to limitations in cyber security technologies, unknown cyber threat might not be deterred with assumed approach. Proposed model confirmed that deterrence by denial strategy might works in deterring known cyber threats within instrumental model. As for the benefit of enhancing deterrence in cyber space there is a serious need to reduce the tendency to ignore exploring this strategy.


Self Funding


Declaration of conflicts of interest


Corresponding author email

Lead author country

  • United Kingdom

Lead author job role

  • Independent researcher

Lead author institution

Sultan Qaboos University

Human Participants

  • No

Ethics statement

In this research, there is no human involvement been conducted.


Log in to write your comment here...