期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
The Application of International Law with Regard to Cyber War in Terms of the Tallinn Manual 2.0
1
作者 Cui Wenbo 《Contemporary International Relations》 2018年第3期128-145,共18页
The study of international law and regulation of cyber war in the Tallinn Manual 2.0 is questionable with regard to attribution, the use of force, the exercise of the right of self-defense, the application of the prin... The study of international law and regulation of cyber war in the Tallinn Manual 2.0 is questionable with regard to attribution, the use of force, the exercise of the right of self-defense, the application of the principle of distinction, and even the definition of‘cyber war'. The application of contemporary law of war to cyberspace, including the militarization of cyberspace itself, should be reviewed judiciously. The construction of a cyberspace community with a shared future may be a better way out. 展开更多
关键词 Tallinn Manual international law:cyberwar CYBERSPACE
在线阅读 下载PDF
Internet of Things Behavioral-Economic Security Design, Actors &Cyber War
2
作者 Robert L. Shuler Billy G. Smith 《Advances in Internet of Things》 2017年第2期25-45,共21页
Using security incident history we identify threats to and using the IoT and other ubiquitous devices emerging since 2012, gaining widespread recognition in 2016, and only lightly addressed in either IoT security lite... Using security incident history we identify threats to and using the IoT and other ubiquitous devices emerging since 2012, gaining widespread recognition in 2016, and only lightly addressed in either IoT security literature or the press. We show the IoT has likely already been used in cyber war between major powers. The new threats, most notably “hijack,” are larger than previous threats combined, but only mildly affect suppliers, and only a few clients. Using a successful behavioral-economic model we show that traditional mitigation places responsibility on un-affected parties and likely will not work. For suppliers, there are profit-conflicted motives, as the new threat rides on a profit vehicle. The new threat circumvents conventional security architecture at a behavioral level. We analyze each actor-target pair and evaluate technical strategies. More effective technical strategies are suggested where old ones are overmatched by the budgets, technical prowess or regulatory power of hostile actors, or the technical nature of the threats. Consolidated action may be needed, but regulation is difficult because of conflicts of interest within the national security community. 展开更多
关键词 Security Reliability Privacy Distributed DENIAL of Service DDOS BOTNET CYBERWAR
暂未订购
上一页 1 下一页 到第
使用帮助 返回顶部