scholarly journals Building a Nuclear Security Regime: Questions to Be Asked

Nuclear Law ◽  
2022 ◽  
pp. 173-203
Author(s):  
Régine Gaucher ◽  
Thomas Languin ◽  
Erik Ducousso

AbstractThis chapter outlines some of the key questions to be asked by a State when considering a nuclear programme and thus a nuclear security regime. In the context of globalization and the emergence of a world in which States are interdependent, it is recognized that the way one State carries out its mission to protect nuclear materials and nuclear activities concerns other States also. In response to this, and despite the reluctance of States to expose their sovereign security practices, an international framework, composed of legally binding or non-binding tools, has been built up with the idea of promoting greater consistency and thus providing guarantees to all States. It is also important, for this one State, to comprehend the national and international context beyond nuclear security within which it falls. This State has then to question itself, in the light of security issues and the fundamental principle of State sovereignty, on the essential concepts that are found in certain components of the nuclear field, such as the positioning of the competent authority, the protection of information, transparency or the place of the operator.

Author(s):  
Andrei V. Bezrukov ◽  
Andrey A. Kondrashev

The article raises the issue of state sovereignty in a federal state and reveals its legal nature. The authors draw attention to the diversity of approaches to the concept and essence of sovereignty, reveal its correlation with related categories, describe the concepts of unity and divisibility of state sovereignty. The paper proves that sovereignty is not a quantitative, but a qualitative characteristic of a state, which is either present or not. The authors substantiate the exclusive possession of state sovereignty by the Russian Federation. Based on the analysis of the doctrinal, regulatory sources and the practice of the Constitutional Court of the Russian Federation, the authors show that the Russian constitutional model explicitly outlines the principle of solid and indivisible state sovereignty spreading throughout the whole territory of the Russian Federation. Recognition of the principle of state sovereignty of Russia presupposes a clear definition of the scope of rights that the Federation should possess in order for its sovereignty to be ensured. The article examines the main features of the state sovereignty of Russia enshrined in the Constitution of the Russian Federation, among which are the supremacy of federal law over the law of the subjects of the Federation, the inviolability of borders and territorial integrity, the unity of the economic space, fiscal, banking and monetary systems, common army (Armed Forces), the right of the state to protect its sovereignty and rights of citizens. Despite the unequivocal decision on the integrity of state sovereignty of the Russian Federation expressed the Constitution of the Russian Federation and by the Constitutional Court of the Russian Federation, this fundamental principle is not completely ensured since the idea of the sovereignty of the republics as components of Russia continues to retain its potential threat to Russian federalism, taking into account the provisions of Art. 73 of the Constitution of the Russian Federation that provide for the full state power of the constituent entities of the Russian Federation


2019 ◽  
pp. 1777-1799
Author(s):  
Emre Erturk

This chapter sets out to explore new trends in cyber and cloud security, and their implications for businesses. First, the terminology and assumptions related to cloud computing are stated. Next, the chapter reports on contemporary research around the awareness of security issues, and the security processes within the cloud computing realm. Cyber security poses a different challenge to local small and medium sized organizations, which may seem to have less at stake financially. However, they are more vulnerable, due to fewer resources dedicated toward prevention. A series of serious security incidents may even keep them out of business. Furthermore, security needs to be understood and handled differently in a cloud based environment. Therefore, the chapter identifies unique security practices and recommendations for these businesses to run their IT resources safely in the cloud.


2013 ◽  
pp. 969-980
Author(s):  
John Campbell ◽  
Kay Bryant

Maintaining the security of information systems and associated data resources is vital if an organization is to minimize losses. Access controls are the first line of defense in this process. The primary function of authentication controls is to ensure that only authorized users have access to information systems and electronic resources. Password-based systems remain the predominant means of user authentication despite viable authentication alternatives. Research suggests that password-based systems are often compromised by poor user security practices. This chapter presents the results of a survey of 884 computer users that examines user practice in creating and reusing password keys, and reports the findings on user password composition and security practices for email accounts. Despite a greater awareness of security issues, the results show that many users still select and reuse weak passwords keys that are based on dictionary words and other meaningful information.


Nuclear Law ◽  
2022 ◽  
pp. 29-43
Author(s):  
Deng Ge

AbstractThe development and utilization of nuclear energy is one of the greatest achievements of the 20th century. It has greatly enhanced the ability of humanity to understand and shape the world and had a significant impact on the development of technology and civilization. In the 21st century, the United Nations (UN) has developed the “Millennium Development Goals” and the “2030 Sustainable Development Goals” to promote a comprehensive solution to the world’s social, economic and environmental issues. To this end, nuclear energy offers unique advantages, but the associated risks and challenges of its further development and utilization must be addressed. Nuclear law is a powerful tool for regulating its development and responding to those risks and challenges. The Chinese Government has always developed nuclear energy for peaceful purposes in a safe and innovative way. At the Nuclear Security Summit in 2014, President Xi Jinping proposed adhering to a rational, coordinated and balanced approach to nuclear security and promoting a fair, cooperative and win–win international nuclear security regime. This not only summarizes China’s experience in establishing a nuclear legal framework and developing nuclear industry, but would also strengthen international nuclear governance and promote nuclear energy to better benefit humanity. The international community should fulfil international obligations strictly, implement national responsibilities effectively, and jointly maintain the UN focused international system and international legal order, contributing to the realization of the common goal of “Atoms for Peace and Development”.


Author(s):  
Emre Erturk

This chapter sets out to explore new trends in cyber and cloud security, and their implications for businesses. First, the terminology and assumptions related to cloud computing are stated. Next, the chapter reports on contemporary research around the awareness of security issues, and the security processes within the cloud computing realm. Cyber security poses a different challenge to local small and medium sized organizations, which may seem to have less at stake financially. However, they are more vulnerable, due to fewer resources dedicated toward prevention. A series of serious security incidents may even keep them out of business. Furthermore, security needs to be understood and handled differently in a cloud based environment. Therefore, the chapter identifies unique security practices and recommendations for these businesses to run their IT resources safely in the cloud.


Sign in / Sign up

Export Citation Format

Share Document