Jump to ContentJump to Main Navigation

You are looking at 1-20 of 27 items

  • Keywords: cyber attacks x
Clear All Modify Search

View:

Cyber Threats: The Emerging Fault Lines of the Nation State

Susan W Brenner

Published in print:
2009
Published Online:
September 2009
ISBN:
9780195385014
eISBN:
9780199855414
Item type:
book
Publisher:
Oxford University Press
DOI:
10.1093/acprof:oso/9780195385014.001.0001
Subject:
Law, Criminal Law and Criminology

As new technologies develop, terrorist groups are developing new methods of attack by using the Internet, and by using cyberspace as a battlefield, it has become increasingly difficult to discover ... More


Identifying the Problem and the Applicable Law

Marco Roscini

in Cyber Operations and the Use of Force in International Law

Published in print:
2014
Published Online:
April 2014
ISBN:
9780199655014
eISBN:
9780191747991
Item type:
chapter
Publisher:
Oxford University Press
DOI:
10.1093/acprof:oso/9780199655014.003.0001
Subject:
Law, Public International Law, Human Rights and Immigration

Chapter 1 identifies the cyber threats to international security and the applicable laws. It starts by identifying the main cases of cyber operations against states of which other states were ... More


Cyber Operations and the Use of Force in International Law

Marco Roscini

Published in print:
2014
Published Online:
April 2014
ISBN:
9780199655014
eISBN:
9780191747991
Item type:
book
Publisher:
Oxford University Press
DOI:
10.1093/acprof:oso/9780199655014.001.0001
Subject:
Law, Public International Law, Human Rights and Immigration

The internet has changed the rules of many industries, and war is no exception. But can a computer virus be classed as an act of war? Does a Denial of Service attack count as an armed attack? And ... More


Cyberwar versus Cyber Attack: The Role of Rhetoric in the Application of Law to Activities in Cyberspace

Laurie R Blank

in Cyber War: Law and Ethics for Virtual Conflicts

Published in print:
2015
Published Online:
April 2015
ISBN:
9780198717492
eISBN:
9780191787041
Item type:
chapter
Publisher:
Oxford University Press
DOI:
10.1093/acprof:oso/9780198717492.003.0006
Subject:
Law, Public International Law, Criminal Law and Criminology

The interplay between law and rhetoric forms an important backdrop for analyzing international legal norms governing state response to cyber threats. First, the term “cyberwar” or “cyberwarfare” is ... More


Military Cyberspace Operations

Gary D. Brown, Paul Walker, and Anthony W. Bell

in U.S. Military Operations: Law, Policy, and Practice

Published in print:
2015
Published Online:
December 2015
ISBN:
9780199328574
eISBN:
9780199363193
Item type:
chapter
Publisher:
Oxford University Press
DOI:
10.1093/acprof:oso/9780199328574.003.0005
Subject:
Law, Public International Law

This chapter overviews how the U.S. government is structured to defend, exploit, and attack in cyberspace and the legal authorities for such activities. It provides insight, guidance, and discussion ... More


Cyber Power, Cyber Weapons, and Cyber Operations

Brandon Valeriano and Ryan C. Maness

in Cyber War versus Cyber Realities: Cyber Conflict in the International System

Published in print:
2015
Published Online:
May 2015
ISBN:
9780190204792
eISBN:
9780190204822
Item type:
chapter
Publisher:
Oxford University Press
DOI:
10.1093/acprof:oso/9780190204792.003.0002
Subject:
Political Science, International Relations and Politics

One of the biggest problems of cyber conflict research is the lack of consensus on terminology. This chapter is an in-depth review of cyber conflict scholarship. It introduces what others describe as ... More


Introduction

Clement Guitton

in Inside the Enemy's Computer: Identifying Cyber Attackers

Published in print:
2017
Published Online:
August 2017
ISBN:
9780190699994
eISBN:
9780190848507
Item type:
chapter
Publisher:
Oxford University Press
DOI:
10.1093/oso/9780190699994.003.0001
Subject:
Political Science, Security Studies

The introduction sets to explain why it is important to look at the question of attribution: in short, it is central to defense and deterrence strategies. Furthermore, the introduction presents the ... More


The Nature of War and the Idea of “Cyberwar”

Larry May

in Cyber War: Law and Ethics for Virtual Conflicts

Published in print:
2015
Published Online:
April 2015
ISBN:
9780198717492
eISBN:
9780191787041
Item type:
chapter
Publisher:
Oxford University Press
DOI:
10.1093/acprof:oso/9780198717492.003.0002
Subject:
Law, Public International Law, Criminal Law and Criminology

This chapter argues that cyberwar is not sufficiently like normal cases of war or armed conflict to justify the relaxation of the rules and laws concerning intentional killing, and that there are ... More


Evidentiary Issues in International Disputes Related to State Responsibility for Cyber Operations

Marco Roscini

in Cyber War: Law and Ethics for Virtual Conflicts

Published in print:
2015
Published Online:
April 2015
ISBN:
9780198717492
eISBN:
9780191787041
Item type:
chapter
Publisher:
Oxford University Press
DOI:
10.1093/acprof:oso/9780198717492.003.0011
Subject:
Law, Public International Law, Criminal Law and Criminology

Existing works on inter-state cyber operations have focused so far on whether such operations are consistent with primary norms of international law and on the remedies available to the victim state ... More


The Rise of Non-State Actors in Cyberwarfare

Nicolò Bussolati

in Cyber War: Law and Ethics for Virtual Conflicts

Published in print:
2015
Published Online:
April 2015
ISBN:
9780198717492
eISBN:
9780191787041
Item type:
chapter
Publisher:
Oxford University Press
DOI:
10.1093/acprof:oso/9780198717492.003.0007
Subject:
Law, Public International Law, Criminal Law and Criminology

This chapter focuses on the rise of non-state actors in cyberwarfare and its impact on international law. The first part considers how digital technologies stimulated an increasing role for non-state ... More


Control and Resistance: Attacks on Burmese Opposition Media

Nart Villeneuve and Masashi Crete-Nishihata

in Access Contested: Security, Identity, and Resistance in Asian Cyberspace

Published in print:
2011
Published Online:
August 2013
ISBN:
9780262016780
eISBN:
9780262298919
Item type:
chapter
Publisher:
The MIT Press
DOI:
10.7551/mitpress/9780262016780.003.0008
Subject:
Society and Culture, Media Studies

This chapter explores Burma’s information control and resistance complexities based on the investigation conducted by the Information Warfare Monitor of the Mizzima News Web site attacks in 2008. The ... More


Standards of Proof

Clement Guitton

in Inside the Enemy's Computer: Identifying Cyber Attackers

Published in print:
2017
Published Online:
August 2017
ISBN:
9780190699994
eISBN:
9780190848507
Item type:
chapter
Publisher:
Oxford University Press
DOI:
10.1093/oso/9780190699994.003.0004
Subject:
Political Science, Security Studies

When can we consider that an attack is attributed, if attribution is not dependent on court proceedings? Do we need "appropriate" standards for the attribution of cyber attacks? What would such ... More


Cyber-Security Challenges

Frédérick Douzet

in The Handbook of European Defence Policies and Armed Forces

Published in print:
2018
Published Online:
July 2018
ISBN:
9780198790501
eISBN:
9780191831737
Item type:
chapter
Publisher:
Oxford University Press
DOI:
10.1093/oso/9780198790501.003.0031
Subject:
Political Science, European Union

With the expansion of cyberspace, European armed forces are confronted by new challenges. Cyber threats keep growing more sophisticated, targeted, and powerful. Not only states, but also individuals, ... More


Time

Clement Guitton

in Inside the Enemy's Computer: Identifying Cyber Attackers

Published in print:
2017
Published Online:
August 2017
ISBN:
9780190699994
eISBN:
9780190848507
Item type:
chapter
Publisher:
Oxford University Press
DOI:
10.1093/oso/9780190699994.003.0006
Subject:
Political Science, Security Studies

How important is the time constraint for attribution? How has the time constraint evolved? And what constitutes an appropriate time for attributing cyber attacks? Timing plays a significant role in ... More


Plausible Deniability

Clement Guitton

in Inside the Enemy's Computer: Identifying Cyber Attackers

Published in print:
2017
Published Online:
August 2017
ISBN:
9780190699994
eISBN:
9780190848507
Item type:
chapter
Publisher:
Oxford University Press
DOI:
10.1093/oso/9780190699994.003.0007
Subject:
Political Science, Security Studies

What does it mean for a cyber attack to be plausibly deniable? And, more to the point, how can states engineer plausible deniability? This chapter makes two related arguments that run against common ... More


How Network Intrusions Threaten

Ben Buchanan

in The Cybersecurity Dilemma: Hacking, Trust and Fear Between Nations

Published in print:
2017
Published Online:
June 2017
ISBN:
9780190665012
eISBN:
9780190686543
Item type:
chapter
Publisher:
Oxford University Press
DOI:
10.1093/acprof:oso/9780190665012.003.0005
Subject:
Political Science, Security Studies

This chapter shows how any network intrusion into a strategically-important network is threatening. Hacking is thus a key part of international relations. This is true regardless of whether or not ... More


Cyber Security: Protecting Our Cyber Citizens

Preet Bharara

in Advances in Cyber Security: Technology, Operations, and Experiences

Published in print:
2013
Published Online:
September 2015
ISBN:
9780823244560
eISBN:
9780823268948
Item type:
chapter
Publisher:
Fordham University Press
DOI:
10.5422/fordham/9780823244560.003.0014
Subject:
Information Science, Information Science

This chapter begins with a discussion of the threat of cyber crime. These threats can range from individual phishing emails that trick victims into disclosing personal and financial information, to ... More


Cyber War: Law and Ethics for Virtual Conflicts

Jens David Ohlin, Kevin Govern, and Claire Finkelstein (eds)

Published in print:
2015
Published Online:
April 2015
ISBN:
9780198717492
eISBN:
9780191787041
Item type:
book
Publisher:
Oxford University Press
DOI:
10.1093/acprof:oso/9780198717492.001.0001
Subject:
Law, Public International Law, Criminal Law and Criminology

Cyberweapons and cyberwarfare are one of the most dangerous innovations of recent years, and a significant threat to national security. Cyberweapons can imperil economic, political, and military ... More


A Taste of Armageddon: The Law of Armed Conflict as Applied to Cyberwar

James J. Busuttil

in The Reality of International Law: Essays in Honour of Ian Brownlie

Published in print:
1999
Published Online:
March 2012
ISBN:
9780198268376
eISBN:
9780191683510
Item type:
chapter
Publisher:
Oxford University Press
DOI:
10.1093/acprof:oso/9780198268376.003.0003
Subject:
Law, Public International Law

This chapter examines the application of the law of armed conflict to cyberwar. It provides definitions related to cyberwar, analyses the actors in this unique battle space, and evaluates examples of ... More


The Intruder’s View

Ben Buchanan

in The Cybersecurity Dilemma: Hacking, Trust and Fear Between Nations

Published in print:
2017
Published Online:
June 2017
ISBN:
9780190665012
eISBN:
9780190686543
Item type:
chapter
Publisher:
Oxford University Press
DOI:
10.1093/acprof:oso/9780190665012.003.0003
Subject:
Political Science, Security Studies

This chapter provides an overview of intrusion operations and applies them to the security dilemma. It works through how offensive cyber operations work and distils important principles. This is ... More


View: