In recent years, analysts have begun discussing strategies for securing entities in cyberspace-including the files and software belonging to corporations, government institutions, and private individuals. Increasingly, analysts have suggested utilizing two types of deterrence...