A Cyber Chase in Cyber Space: How International Law Must Address the Threat of Cyber Attacks or Suffer the Consequences

2013 ◽  
Author(s):  
Leah Marie Shellberg



2017 ◽  
Vol 10 (1) ◽  
pp. 63-89 ◽  
Author(s):  
Jozef Valuch ◽  
Tomáš Gábriš ◽  
Ondrej Hamuľák

Abstract The aim of this paper is to evaluate and differentiate between the phenomena of cyberwarfare and information warfare, as manifestations of what we perceive as postmodern warfare. We describe and analyse the current examples of the use the postmodern warfare and the reactions of states and international bodies to these phenomena. The subject matter of this paper is the relationship between new types of postmodern conflicts and the law of armed conflicts (law of war). Based on ICJ case law, it is clear that under current legal rules of international law of war, cyber attacks as well as information attacks (often performed in the cyberspace as well) can only be perceived as “war” if executed in addition to classical kinetic warfare, which is often not the case. In most cases perceived “only” as a non-linear warfare (postmodern conflict), this practice nevertheless must be condemned as conduct contrary to the principles of international law and (possibly) a crime under national laws, unless this type of conduct will be recognized by the international community as a “war” proper, in its new, postmodern sense.



2016 ◽  
Vol 2 (1) ◽  
pp. 205-211
Author(s):  
Ivan Sang


2019 ◽  
Vol 5 (2) ◽  
pp. 79
Author(s):  
Pshtiwan Mohammed Qader

The present paper examines the problem of cyber-attacks under existing international law. It takes the view that the (United Nations) UN Charter provisions on the use of force can be extended to cyber-attacks by means of interpretation although the relevant provisions do not explicitly address such issue. This Article argues that cyber-attacks resulting in material damage or destruction to property, death or injury to persons, or severe disruption of the functioning of critical infrastructures can be characterized as use of armed force and therefore violate the prohibition contained in article 2(4) of the Charter. However, cyber-attacks not resulting in the above consequences may be illegal intervention in the internal affairs of other states if such attacks are coercive in nature. In addition, the current study discusses that a cyber-attack which amounts to a use of armed force per se is not sufficient to give the victim state the right to self-defense, unless its scale and effects are equivalent to those of a conventional armed attack. Finally, the study concludes that an international cyber treaty is truly necessary to more effectively address cyber-attacks.



2018 ◽  
pp. 1060-1092
Author(s):  
Hanaa. M. Said ◽  
Rania El Gohary ◽  
Mohamed Hamdy ◽  
Abdelbadeeh M. Salem

Cyberspace is known as the digital electronic medium for the knowing range of securing in the cyberspace. Therefore the importance of inferring the reference measure in the form of assessment procedure to improve the knowledge and making the decision for the e- government services. A series of the standards build on the application of data mining methods specifically represented as decision tress model, Logistic regression, association rules model, Bayesian network for making reference measurements, to measure the extent of securing the data, and the provided services. The authors discuss various types of cyber-attacks describing how data mining helps in detection and prevention of these attacks. A comparative analysis between a set of selected frameworks is presented. Finally this chapter imparts numbers of applications for the data mining Methodologies in Cyber Security. Results applied on the site of the authority for cleaning and beautifying Cairo governorate in Egypt.



Author(s):  
Vesna Poposka

Referring to the cyber space as the new dimension of warfare opens many legal challenges. Those challenges can be settled in two main clusters: first one related to the usage of cyberspace as a weapon itself, related the environment in which terrorist attack occurs (meaning that cyber infrastructure and cyber are used for terrorist attacks, or as an asset during counterterrorist operations), and the second drives on ancillary usage of the cyber infrastructure, means and methods for the same purposes. The cyberspace is lacking specific legal regime that is applicable, same as cyber attacks. While the specific applicable regime is lacking, as well as any consensus upon that issue, what has to be considered is if any parts of the currently ongoing legal regimes are applicable. Put into the context of cyber warfare, it can lead to different solutions, examined in the chapter.



2021 ◽  
Vol 10 (2) ◽  
pp. 38-45
Author(s):  
Saiida Lazaar

The great revolution of technology and its fast growth have led to a cyber space increasingly vulnerable to cyber-attacks. For this reason, cyber security becomes paramount to protect our cyber space by presenting and implementing important solutions to protect sensitive data from malicious persons. Thereby various measures of protection have been developed and aim to minimize the risks and damages of attacks. Among them, cryptography plays a vital and crucial role in protecting sensitive transmissions and electronic exchanges through complex networks. Numerous scientific studies have emerged with the advent of the cloud and the Internet of Things (IoT); all of them have expressed a strong need for building secure, efficient and fast cryptosystems targeting confidentiality, integrity and authentication. The last two objectives are essentially built on hash functions which are the main components of many applications and secure networks. The purpose of this paper is to give recent advances of lightweight cryptographic solutions that meet the requirements of constrained systems, and to present a study, in terms of security, energy-consuming and efficiency, of the main hash functions standardized by NIST (National Institute of Standards and Technology). In the end, the paper will give a comparison between the studied hash functions aiming to come up with a recommendation of good lightweight hash functions suitable for implementation in an IoT framework.



Author(s):  
Madeline Carr

When The Anarchical Society was published in 1977, the world was on the doorstep of seismic technological change. Forty years later, the information age has placed cyber security at the centre of many global political concerns including armed conflict and international law. The ongoing difficulties associated with accurately attributing cyber attacks introduce a new dimension of anarchy in international relations. This essay draws on Bull’s ideas about social interplay to explore the problem of attribution in cyberspace. It finds that the difficulties of identifying (even) state actors undermine some of the processes and institutions upon which Bull based his ideas. However, it also finds that Bull’s work is useful in unpicking exactly why attribution is so problematic for international relations. Ultimately, Bull’s expectation that actors will look for social solutions to maintain order appears to be holding up in the information age much as it did in the industrial age.



2020 ◽  
Author(s):  
Nasser AlAzwani ◽  
Tom Chen

Cyber deterrence by denial strategy can be practised by the state by making it hard for adversaries to succeed any attempt of attacking. It was practised during nuclear deterrence strategies as well as in many other conventional deterrence. This paper argues the functionality of cyber deterrence by denial in deterring cyber threats. In this paper, our attempt is to define cyber deterrence by denial, model it, explore operational roles of cyber security technologies in approaching deterrence by denial within cyber space. Model analysis shed lights over practicing deterrence by denial and its vital role in understanding how efficiently denial can work in maximize failure of any attack which will impact in maximizing cost of cyber attacks to the attacker. Due to limitations in cyber security technologies, unknown cyber threat might not be deterred with assumed approach. Proposed model confirmed that deterrence by denial strategy might works in deterring known cyber threats within instrumental model. As for the benefit of enhancing deterrence in cyber space there is a serious need to reduce the tendency to ignore exploring this strategy.



Sign in / Sign up

Export Citation Format

Share Document