Trusted Computing Initiative on the Spectrum of EU Cyber-Security Legal Framework

Author(s):  
Yianna Danidou
2018 ◽  
Author(s):  
Peter M. Shane

This critique of Karson K. Thompson’s note, "Not Like an Egyptian: Cybersecurity and the Internet Kill Switch Debate," argues that the U.S. lacks a framework of laws and regulations, "smart" or otherwise, that adequately incentivizes the parties with the greatest capacity to improve our cyber security to do so. It attributes the poor state of U.S. cyber policy to the "bewildering array of overlapping responsibilities" scattered among government offices and departments; the difficult imperative of sharing responsibility among military and civilian authorities; the fact that most of the networks (and the dependent critical infrastructures) that need protecting are in private hands; and the lack of public understanding of the kinds of regulation that are necessary or appropriate. The essay argues that meaningful progress towards an adequate legal framework depends on a broad national debate aimed at defining the public good with regard to cyber-security, and the inevitable trade-offs among security, privacy, productivity, economic growth, organizational flexibility, military effectiveness, government transparency, and accountability that must be confronted in making sensible cyber-security policy.


2014 ◽  
pp. 471-514
Author(s):  
Catherine B. Lotrionte

This chapter discusses the nature of cyber threats against government and private computer systems, describing some steps the government has taken and the challenges involved in protecting those systems. The chapter argues that a national security approach for cyber security policy is the most promising option for preventing these cyber threats while operating within the domestic legal framework. After a review of the President's constitutional authorities to protect the nation from traditional threats, the chapter concludes that the President has some power to monitor Internet communications in transit within the United States when the communications threaten the welfare of the nation. The chapter recommends that this authority be augmented by Congressional action through legislation. The President's powers in cyber security, even given Congressional support, however, are still restrained by the protections the Fourth Amendment provides for traditional forms of communication and individual privacy. Although there is limited Fourth Amendment precedent in the area of cyber security, the well-established exceptions to the Fourth Amendment requirements, based on consent, special governmental needs and the reasonableness of the search or seizure, provide a legal basis for executive branch action to protect critical infrastructures and their computer systems. As the Courts have long held, these exceptions allow the government to conduct searches or seizures without being bound by all of the requirements of the Fourth Amendment. If the government develops its cyber security policy in line with these exceptions, this chapter argues the government can both protect critical computer systems and operate within Fourth Amendment doctrine that recognizes the legitimacy of privacy in electronic communications.


2021 ◽  
pp. 155-161
Author(s):  
S. KRASNIKOV

The issue of providing cyber defense has been detailed. Domestic strategic documents on cyber security and cyber defense are considered. The principles of implementation of the state military policy for the purpose of development of cyber defense potential are fixed. Prospects for the formation of cyber troops in Ukraine are outlined. NATO's approach to the concept and features of cyber defense is revealed. The Turkish experience of providing state cyber defense is highlighted. The prospects of improving the cyber defense potential of our country are identified, taking into account the effective achievements of foreign experience.


Author(s):  
Shivanand Venkatesh Raskonda ◽  
Prakash Sakharkar

In this Digital Modern World the Automation in transport is increasing rapidly. While it is expected that automated driving will have a substantial impact on travel demand, the exact nature of that impact is unknown at this time. Benefits of Automated Vehicles are better in some points are quick decisions than people and less pollution making. Trust on the Automated Vehicle in this Digital Era is safe. In this Paper We have focused all aspects of the Self Driving Vehicle Failures, Cyber Security Impacts, Industries Impacts, Bad Weather Condition Impacts, Traffic Congestions, Legal Framework for the Self Driving Vehicles, Peoples Opinion, Economic Impacts, Technologies use which will be in the next decade.


2020 ◽  
Vol 50 (4) ◽  
pp. 321-329
Author(s):  
Sławomir Dygnatowski ◽  
Włodzimierz Dygnatowski

SummaryThe last decades have brought about the rapid development of information technology, which was reflected in all areas of social life and economic. Unfortunately, the ongoing digitization and the presence of individuals, private entities as well as countries in the network makes them exposed to new types of threats that have never been seen before. The perpetrators of these threats may be individuals, organized criminal groups or foreign country interviews. Threats and vectors of attacks has many forms, and their evolution continues all along with the progressive development of broadly understood cyberspace. In order to be able to effectively fight with the increasing threats in cyberspace, not only technical and organizational measures are needed, but also the formal and legal framework to combat cyber-attacks. In this article, the authors discuss the legal comparison of the basics of cyber security against the Polish background and EU legislation.


2018 ◽  
Vol 60 (1) ◽  
pp. 173-201
Author(s):  
Stefan A. Kaiser

With an increasing influence of computers and software, automation is affecting many areas of daily life. Autonomous systems have become a central notion, but many systems have reached only a lower level of automation and not yet full autonomy. Information technology and software have a strong impact and their industries are introducing their own business cultures. Even though autonomy will enable systems to act independently from direct human input and control in complex scenarios, the factors of responsibility, control, and attribution are of crucial importance for a legal framework. Legal responsibility has to serve as a safeguard of fundamental rights. Responsibility can be attributed by a special legal regime, and mandatory human override and fallback modes can assure human intervention and control. It is proposed to establish a precautionary regulatory regime for automated and autonomous systems to include general principles on responsibility, transparency, training, human override and fallback modes, design parameters for algorithms and artificial intelligence, and cyber security. States need to take a positivist approach, maintain their regulatory prerogative, and, in support of their exercise of legislative and executive functions, establish an expertise independent of industry in automation, autonomy, algorithms, and artificial intelligence.


2021 ◽  
Vol 83 (3) ◽  
pp. 152-163
Author(s):  
Інна Сергіївна Заярна

Due to the COVID-19 pandemic a strict quarantine was imposed from March to May of 2020. Ukrainian higher education faced new challenges caused by unexpected distance teaching and learning implemented in all higher educational establishments during the period in question. Despite the sound theoretical achievements of Ukrainian scientists in the field of distance education, as well as the existing legal framework for the implementation of distance learning in higher education, not all educational institutions had well-established learning management systems. All the above induced foreign languages teachers to search for available technologies which allow delivering their lectures effectively. One of the most popular services was video conferencing, in particular Zoom. The research deals with the specifics of teaching foreign languages in higher educational establishments on Zoom Platform via video conferencing. The research presents the results of the survey conducted among the teachers who used Zoom for teaching foreign languages during the quarantine from March to June in 2020. Based on the survey respondents’ answers, the author determines benefits and drawbacks of Zoom for teaching foreign languages in higher educational establishments, specifies the factors for psychological comfort, as well as the conditions and tools for the development of language skills and speech abilities. Special attention is paid to methodological recommendations aimed at practical implementation of foreign languages online teaching via Zoom video conferencing. The author considers such aspects of foreign languages teaching via Zoom video conferencing as cyber security, discipline issues, creation of psychologically comfortable atmosphere, and Zoom technical tools for teaching foreign language communication.


2021 ◽  
Vol 2021 (1) ◽  
pp. 60-73
Author(s):  
Nataliya MAROZ

Cyber technologies have changed both social and international relations dramatically. The influence of information and telecommunication technologies (hereafter – ICTs) extends from daily life to fundamental freedoms, economies, public administration and political relations. Recent changes brought by coronavirus has emphasized the world’s heavy dependence on ICTs. The technologies provide a virtual environment for normal working processes, ensure e-procurement for medical equipment and supplies, raise awareness of coronavirus prevention, maintain people’s life at hospitals etc. However, ICTs not only provide considerable benefits to society as a whole, but also can be used for criminal purposes as well as in manner inconsistent with the Charter of the United Nations to inflict substantial damage to critical infrastructure of a state, interfere in elections, block e-government and bank services etc. The pandemic has led to the introduction of new cyber challenges and risks. At the same time, there is no international treaty on cybersecurity as well as on combating cybercrime concluded under the auspices of the United Nations that could be applicable to cope with these newly emerged threats. In this situation, cybersecurity challenges might be addressed through ethical norms, which are more flexible than international legal norms. Thus, in the absence of comprehensive legal response to cyber risks cyber ethics is particularly important. Therefore, the article analyzes international legal basis for international cyber ethics. It distinguishes the types of international relations that are regulated by ethical norms. The research defines new risks to cyber security that have emerged during the pandemic and discusses possible ways to respond them through cyber ethics. The paper expresses a view that ethical rules concerning friendly and responsible state behaviour in the context of combating cybercrime should be reflected in an international convention on countering the use of information and communications technologies for criminal purposes, which is going to be developed under the auspices of the United Nations.


Sign in / Sign up

Export Citation Format

Share Document