Cyber Warfare: Jus Post Bellum - Problem of Cyber Attack Accountability, International Treaties for Post-Conflict Period, Comparison to Traditional Warfare, 1998 Kosovo and 2003 Iraq Wars, North Korea

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Cyber Warfare: Jus Post Bellum - Problem of Cyber Attack Accountability, International Treaties for Post-Conflict Period, Comparison to Traditional Warfare, 1998 Kosovo and 2003 Iraq Wars, North Korea by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9781370885817
Publisher: Progressive Management Publication: November 29, 2016
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9781370885817
Publisher: Progressive Management
Publication: November 29, 2016
Imprint: Smashwords Edition
Language: English

This excellent report has been professionally converted for accurate flowing-text e-book format reproduction. There is a lack of attention to the aftermath of a deployed cyber weapon: There is no mechanism for the assignment of accountability for the restoration of affected infrastructure and remediation of violation of established laws of war after cyberattacks occur. This study analyzes International Humanitarian Law and international treaties as they apply to the cyber post-conflict period and explores current jus post bellum frameworks, which can be used to design a cyber-warfare jus post bellum framework. It also analyzes analogies to traditional warfare in the damage assessment and aid provided during the recovery period of the 1998 Kosovo and the 2003 Iraq Wars. It also discusses the available international cyber organizations. As an example, the study analyzes responses to cyberattacks in a case study involving South Korea and North Korea.
Additionally, this study examines the related issues of the effects of deploying a cyber-weapon, the ways to establish acceptable levels of attribution, the challenges of cyber-damage assessments, and the ability to contain and reverse cyberattacks. This thesis proposes a cyber-warfare jus post bellum framework, with emphasis on prevention and cyber weapons control, proposes cyberattack relief-effort actions, and offers a post-cyberattack cost checklist.

CHAPTER I - INTRODUCTION * A. CYBER WARFARE: JUS POST BELLUM FRAMEWORK DEVELOPMENT JUSTIFICATION * B. THESIS PURPOSE * C. THESIS OUTLINE * CHAPTER II - BACKGROUND * A. INTERNATIONAL HUMANITARIAN LAW * B. JUS POST BELLUM * C. JUS POST BELLUM IN CYBERSPACE * D. TREATIES AND ARTICLES APPLICABLE TO JUS POST BELLUM * 1. Hague Conventions * 2. Geneva Convention * 3. Conventions Prohibiting Certain Conventional Weapons * 4. Additional Treaties Prosecutable for War Crimes * 5. Genocide * 6. Mercenaries * 7. Additional Rights Violations * 8. UN Charter * a. Article 39 * b. Article 51 * c. Article 92 * d. Article 94 * 9. Statute of the ICJ * a. Article 36 * b. Article 38 * c. Article 41 * 10. ICC * 11. NATO * E. CONCLUSION * CHAPTER III - CYBERATTACKS * A. TYPES OF CYBERATTACKS * B. CYBERATTACK VECTORS * C. CYBERATTACK EFFECTS * D. CYBER-WEAPON DAMAGE ASSESSMENT * E. ATTRIBUTION * F. CONTAINABILITY AND REVERSIBILITY OF CYBER WEAPONS * G. CONCLUSION * CHAPTER IV - PAST KINETIC OPERATIONS * A. STABILITY OPERATIONS * B. DAMAGE ASSESSMENT KINETIC VERSUS CYBER * 1. Jus Post Bellum Cost * 2. Entities Involved in Reconstructions * a. 2003 Iraq War * b. 1998 Kosovo War * C. INTERNATIONAL CYBER ORGANIZATIONS * D. CONCLUSION * CHAPTER V - CASE STUDY: NORTH KOREAN CYBERATTACKS * A. INTRODUCTION * B. NORTH KOREA * C. NORTH-KOREA SUSPECTED CYBERATTACKS * 1. July 2004 * 2. August/September 2005 * 3. July 2006 * 4. October 2007 * 5. September 2008 * 6. March 2009 * 7. July 2009. * 8. November 2009 * 9. January, March, and October 2010 * 10. March 2011 * 11. June 2012 * 12. June 2012 * 13. March 2013 * 14. June 2013 * 15. November 2014 * D. ATTRIBUTION ANALYSIS OF THE ATTACKS * E. ANALYSIS * 1. Damage Costs * 2. Establishing Attribution * 3. Cyberattack Responses * F. CONCLUSION * CHAPTER VI - RECOMMENDATIONS * A. CYBER-WARFARE JUS POST BELLUM FRAMEWORK * 1. Outlaw Unethical Cyber Weapons * 2. Add Critical Cyber Infrastructure to the Protected Sites * 3. International Community Involvement * 4. Accountability * a. Punishment * b. Restoration of Affected System and Infrastructure * c. Proportionality * 5. Plans * B. CYBERATTACK RESPONSE * 1. Step 1: Information Gathering * 2. Step 2: Cyberwar * 3. Step 3: International Notification * 4. Step 4: Formal Investigation * 5. Step 5: Attribution * 6. Step 6: Cyberattack Response * 7. Step 7: Recovery * a. Cost Assessment * b. Vulnerabilities Elimination * c. Anti-malware Signatures * d. Restoration * e. Incident Response Planning * f. Education * CHAPTER VII - CONCLUSION

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This excellent report has been professionally converted for accurate flowing-text e-book format reproduction. There is a lack of attention to the aftermath of a deployed cyber weapon: There is no mechanism for the assignment of accountability for the restoration of affected infrastructure and remediation of violation of established laws of war after cyberattacks occur. This study analyzes International Humanitarian Law and international treaties as they apply to the cyber post-conflict period and explores current jus post bellum frameworks, which can be used to design a cyber-warfare jus post bellum framework. It also analyzes analogies to traditional warfare in the damage assessment and aid provided during the recovery period of the 1998 Kosovo and the 2003 Iraq Wars. It also discusses the available international cyber organizations. As an example, the study analyzes responses to cyberattacks in a case study involving South Korea and North Korea.
Additionally, this study examines the related issues of the effects of deploying a cyber-weapon, the ways to establish acceptable levels of attribution, the challenges of cyber-damage assessments, and the ability to contain and reverse cyberattacks. This thesis proposes a cyber-warfare jus post bellum framework, with emphasis on prevention and cyber weapons control, proposes cyberattack relief-effort actions, and offers a post-cyberattack cost checklist.

CHAPTER I - INTRODUCTION * A. CYBER WARFARE: JUS POST BELLUM FRAMEWORK DEVELOPMENT JUSTIFICATION * B. THESIS PURPOSE * C. THESIS OUTLINE * CHAPTER II - BACKGROUND * A. INTERNATIONAL HUMANITARIAN LAW * B. JUS POST BELLUM * C. JUS POST BELLUM IN CYBERSPACE * D. TREATIES AND ARTICLES APPLICABLE TO JUS POST BELLUM * 1. Hague Conventions * 2. Geneva Convention * 3. Conventions Prohibiting Certain Conventional Weapons * 4. Additional Treaties Prosecutable for War Crimes * 5. Genocide * 6. Mercenaries * 7. Additional Rights Violations * 8. UN Charter * a. Article 39 * b. Article 51 * c. Article 92 * d. Article 94 * 9. Statute of the ICJ * a. Article 36 * b. Article 38 * c. Article 41 * 10. ICC * 11. NATO * E. CONCLUSION * CHAPTER III - CYBERATTACKS * A. TYPES OF CYBERATTACKS * B. CYBERATTACK VECTORS * C. CYBERATTACK EFFECTS * D. CYBER-WEAPON DAMAGE ASSESSMENT * E. ATTRIBUTION * F. CONTAINABILITY AND REVERSIBILITY OF CYBER WEAPONS * G. CONCLUSION * CHAPTER IV - PAST KINETIC OPERATIONS * A. STABILITY OPERATIONS * B. DAMAGE ASSESSMENT KINETIC VERSUS CYBER * 1. Jus Post Bellum Cost * 2. Entities Involved in Reconstructions * a. 2003 Iraq War * b. 1998 Kosovo War * C. INTERNATIONAL CYBER ORGANIZATIONS * D. CONCLUSION * CHAPTER V - CASE STUDY: NORTH KOREAN CYBERATTACKS * A. INTRODUCTION * B. NORTH KOREA * C. NORTH-KOREA SUSPECTED CYBERATTACKS * 1. July 2004 * 2. August/September 2005 * 3. July 2006 * 4. October 2007 * 5. September 2008 * 6. March 2009 * 7. July 2009. * 8. November 2009 * 9. January, March, and October 2010 * 10. March 2011 * 11. June 2012 * 12. June 2012 * 13. March 2013 * 14. June 2013 * 15. November 2014 * D. ATTRIBUTION ANALYSIS OF THE ATTACKS * E. ANALYSIS * 1. Damage Costs * 2. Establishing Attribution * 3. Cyberattack Responses * F. CONCLUSION * CHAPTER VI - RECOMMENDATIONS * A. CYBER-WARFARE JUS POST BELLUM FRAMEWORK * 1. Outlaw Unethical Cyber Weapons * 2. Add Critical Cyber Infrastructure to the Protected Sites * 3. International Community Involvement * 4. Accountability * a. Punishment * b. Restoration of Affected System and Infrastructure * c. Proportionality * 5. Plans * B. CYBERATTACK RESPONSE * 1. Step 1: Information Gathering * 2. Step 2: Cyberwar * 3. Step 3: International Notification * 4. Step 4: Formal Investigation * 5. Step 5: Attribution * 6. Step 6: Cyberattack Response * 7. Step 7: Recovery * a. Cost Assessment * b. Vulnerabilities Elimination * c. Anti-malware Signatures * d. Restoration * e. Incident Response Planning * f. Education * CHAPTER VII - CONCLUSION

More books from Progressive Management

Cover of the book 21st Century FEMA Study Course: Military Resources in Emergency Management (IS-75), Defense Support of Civil Authorities, Useful Military Capabilities, NRF and NIMS by Progressive Management
Cover of the book Indonesia in Perspective: Orientation Guide and Javanese, Bahasa Cultural Orientation: Geography, History, Economy, Security, Jakarta, Sukarno, Bali, Nusa Tenggara, Kalimantan, Sulawesi, Papua by Progressive Management
Cover of the book Call Sign: Dustoff: A History of U.S. Army Aeromedical Evacuation from Conception to Hurricane Katrina, MEDEVAC, Air Ambulance, MAST, Korea, Vietnam War, Persian Gulf War, Afghanistan, Iraq by Progressive Management
Cover of the book The Failure of Jihad in Saudi Arabia: AQAP, al-Qa'ida on the Arabian Peninsula, East Riyadh Bombing, al-Nashiri by Progressive Management
Cover of the book Nuclear Matters Handbook, Expanded Edition: Guide to American Nuclear Weapons, History, Testing, Safety and Security, Plans, Delivery Systems, Physics and Bomb Designs, Effects, Accident Response by Progressive Management
Cover of the book National Aeronautics Research and Development Plan and Development, Test and Evaluation (RDT&E) Infrastructure Plan - Air Traffic, Unmanned Aircraft Systems (UAS), NAS, Hypersonic Flight, Safety by Progressive Management
Cover of the book The Report of the Presidential Commission on the Space Shuttle Challenger Accident: The Tragedy of Mission 51-L in 1986 - Volume Three, Appendix N, Photo and TV Support Team Report by Progressive Management
Cover of the book Nanoscience and Nanotechnology: NIST Center for Nanoscale Science and Technology (CNST) NanoFab Cleanroom Safety Manual by Progressive Management
Cover of the book Histories of the Soviet / Russian Space Program: Volume 5: Soviet Space Programs: 1981-87 - Piloted Space Activities, Launch Vehicles, Launch Sites, and Tracking Support by Progressive Management
Cover of the book Islam: Ideology and Conflict - Analysis of Islamic World's Diversity of Politics and Faith, Extremism and Terrorism, Sunni and Shia Divide, Sectarian Violence, Review of Islam's Historical Conflicts by Progressive Management
Cover of the book Complete Guide to al-Shabaab, al-Qaeda, Mujahideen Youth Movement (MYM), Terrorism in East Africa, Somalia, Mall Attack in Nairobi, Kenya, Transnational Terrorist Threat by Progressive Management
Cover of the book Personnel Replacement Operations During Operations Desert Storm and Desert Shield: Interviews to Assess Theater Replacements in the First Gulf War in Iraq, Doctrinal Publications and Echelon by Progressive Management
Cover of the book 21st Century Cellulosic Ethanol, Biomass, and Biofuels: Wood Chips, Stalks, Switchgrass, Plant Products, Feedstocks, Cellulose Conversion Processes, Research Plans by Progressive Management
Cover of the book 2011 Complete Guide to Egypt: Mubarak, Government and Politics, NDP, Military, Muslim Brotherhood, Human Rights, History, Economy, American Response to Protest Crisis - Authoritative Coverage by Progressive Management
Cover of the book Challengers from the Sidelines: Understanding America's Violent Far-Right - Aryan Nation, Timothy McVeigh, Oklahoma City Bombing, KKK, Racism, White Supremacy, Neo-Nazi, Skinheads, Christian Identity by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy