Cyber Warfare: Jus Post Bellum - Problem of Cyber Attack Accountability, International Treaties for Post-Conflict Period, Comparison to Traditional Warfare, 1998 Kosovo and 2003 Iraq Wars, North Korea

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Cyber Warfare: Jus Post Bellum - Problem of Cyber Attack Accountability, International Treaties for Post-Conflict Period, Comparison to Traditional Warfare, 1998 Kosovo and 2003 Iraq Wars, North Korea by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9781370885817
Publisher: Progressive Management Publication: November 29, 2016
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9781370885817
Publisher: Progressive Management
Publication: November 29, 2016
Imprint: Smashwords Edition
Language: English

This excellent report has been professionally converted for accurate flowing-text e-book format reproduction. There is a lack of attention to the aftermath of a deployed cyber weapon: There is no mechanism for the assignment of accountability for the restoration of affected infrastructure and remediation of violation of established laws of war after cyberattacks occur. This study analyzes International Humanitarian Law and international treaties as they apply to the cyber post-conflict period and explores current jus post bellum frameworks, which can be used to design a cyber-warfare jus post bellum framework. It also analyzes analogies to traditional warfare in the damage assessment and aid provided during the recovery period of the 1998 Kosovo and the 2003 Iraq Wars. It also discusses the available international cyber organizations. As an example, the study analyzes responses to cyberattacks in a case study involving South Korea and North Korea.
Additionally, this study examines the related issues of the effects of deploying a cyber-weapon, the ways to establish acceptable levels of attribution, the challenges of cyber-damage assessments, and the ability to contain and reverse cyberattacks. This thesis proposes a cyber-warfare jus post bellum framework, with emphasis on prevention and cyber weapons control, proposes cyberattack relief-effort actions, and offers a post-cyberattack cost checklist.

CHAPTER I - INTRODUCTION * A. CYBER WARFARE: JUS POST BELLUM FRAMEWORK DEVELOPMENT JUSTIFICATION * B. THESIS PURPOSE * C. THESIS OUTLINE * CHAPTER II - BACKGROUND * A. INTERNATIONAL HUMANITARIAN LAW * B. JUS POST BELLUM * C. JUS POST BELLUM IN CYBERSPACE * D. TREATIES AND ARTICLES APPLICABLE TO JUS POST BELLUM * 1. Hague Conventions * 2. Geneva Convention * 3. Conventions Prohibiting Certain Conventional Weapons * 4. Additional Treaties Prosecutable for War Crimes * 5. Genocide * 6. Mercenaries * 7. Additional Rights Violations * 8. UN Charter * a. Article 39 * b. Article 51 * c. Article 92 * d. Article 94 * 9. Statute of the ICJ * a. Article 36 * b. Article 38 * c. Article 41 * 10. ICC * 11. NATO * E. CONCLUSION * CHAPTER III - CYBERATTACKS * A. TYPES OF CYBERATTACKS * B. CYBERATTACK VECTORS * C. CYBERATTACK EFFECTS * D. CYBER-WEAPON DAMAGE ASSESSMENT * E. ATTRIBUTION * F. CONTAINABILITY AND REVERSIBILITY OF CYBER WEAPONS * G. CONCLUSION * CHAPTER IV - PAST KINETIC OPERATIONS * A. STABILITY OPERATIONS * B. DAMAGE ASSESSMENT KINETIC VERSUS CYBER * 1. Jus Post Bellum Cost * 2. Entities Involved in Reconstructions * a. 2003 Iraq War * b. 1998 Kosovo War * C. INTERNATIONAL CYBER ORGANIZATIONS * D. CONCLUSION * CHAPTER V - CASE STUDY: NORTH KOREAN CYBERATTACKS * A. INTRODUCTION * B. NORTH KOREA * C. NORTH-KOREA SUSPECTED CYBERATTACKS * 1. July 2004 * 2. August/September 2005 * 3. July 2006 * 4. October 2007 * 5. September 2008 * 6. March 2009 * 7. July 2009. * 8. November 2009 * 9. January, March, and October 2010 * 10. March 2011 * 11. June 2012 * 12. June 2012 * 13. March 2013 * 14. June 2013 * 15. November 2014 * D. ATTRIBUTION ANALYSIS OF THE ATTACKS * E. ANALYSIS * 1. Damage Costs * 2. Establishing Attribution * 3. Cyberattack Responses * F. CONCLUSION * CHAPTER VI - RECOMMENDATIONS * A. CYBER-WARFARE JUS POST BELLUM FRAMEWORK * 1. Outlaw Unethical Cyber Weapons * 2. Add Critical Cyber Infrastructure to the Protected Sites * 3. International Community Involvement * 4. Accountability * a. Punishment * b. Restoration of Affected System and Infrastructure * c. Proportionality * 5. Plans * B. CYBERATTACK RESPONSE * 1. Step 1: Information Gathering * 2. Step 2: Cyberwar * 3. Step 3: International Notification * 4. Step 4: Formal Investigation * 5. Step 5: Attribution * 6. Step 6: Cyberattack Response * 7. Step 7: Recovery * a. Cost Assessment * b. Vulnerabilities Elimination * c. Anti-malware Signatures * d. Restoration * e. Incident Response Planning * f. Education * CHAPTER VII - CONCLUSION

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This excellent report has been professionally converted for accurate flowing-text e-book format reproduction. There is a lack of attention to the aftermath of a deployed cyber weapon: There is no mechanism for the assignment of accountability for the restoration of affected infrastructure and remediation of violation of established laws of war after cyberattacks occur. This study analyzes International Humanitarian Law and international treaties as they apply to the cyber post-conflict period and explores current jus post bellum frameworks, which can be used to design a cyber-warfare jus post bellum framework. It also analyzes analogies to traditional warfare in the damage assessment and aid provided during the recovery period of the 1998 Kosovo and the 2003 Iraq Wars. It also discusses the available international cyber organizations. As an example, the study analyzes responses to cyberattacks in a case study involving South Korea and North Korea.
Additionally, this study examines the related issues of the effects of deploying a cyber-weapon, the ways to establish acceptable levels of attribution, the challenges of cyber-damage assessments, and the ability to contain and reverse cyberattacks. This thesis proposes a cyber-warfare jus post bellum framework, with emphasis on prevention and cyber weapons control, proposes cyberattack relief-effort actions, and offers a post-cyberattack cost checklist.

CHAPTER I - INTRODUCTION * A. CYBER WARFARE: JUS POST BELLUM FRAMEWORK DEVELOPMENT JUSTIFICATION * B. THESIS PURPOSE * C. THESIS OUTLINE * CHAPTER II - BACKGROUND * A. INTERNATIONAL HUMANITARIAN LAW * B. JUS POST BELLUM * C. JUS POST BELLUM IN CYBERSPACE * D. TREATIES AND ARTICLES APPLICABLE TO JUS POST BELLUM * 1. Hague Conventions * 2. Geneva Convention * 3. Conventions Prohibiting Certain Conventional Weapons * 4. Additional Treaties Prosecutable for War Crimes * 5. Genocide * 6. Mercenaries * 7. Additional Rights Violations * 8. UN Charter * a. Article 39 * b. Article 51 * c. Article 92 * d. Article 94 * 9. Statute of the ICJ * a. Article 36 * b. Article 38 * c. Article 41 * 10. ICC * 11. NATO * E. CONCLUSION * CHAPTER III - CYBERATTACKS * A. TYPES OF CYBERATTACKS * B. CYBERATTACK VECTORS * C. CYBERATTACK EFFECTS * D. CYBER-WEAPON DAMAGE ASSESSMENT * E. ATTRIBUTION * F. CONTAINABILITY AND REVERSIBILITY OF CYBER WEAPONS * G. CONCLUSION * CHAPTER IV - PAST KINETIC OPERATIONS * A. STABILITY OPERATIONS * B. DAMAGE ASSESSMENT KINETIC VERSUS CYBER * 1. Jus Post Bellum Cost * 2. Entities Involved in Reconstructions * a. 2003 Iraq War * b. 1998 Kosovo War * C. INTERNATIONAL CYBER ORGANIZATIONS * D. CONCLUSION * CHAPTER V - CASE STUDY: NORTH KOREAN CYBERATTACKS * A. INTRODUCTION * B. NORTH KOREA * C. NORTH-KOREA SUSPECTED CYBERATTACKS * 1. July 2004 * 2. August/September 2005 * 3. July 2006 * 4. October 2007 * 5. September 2008 * 6. March 2009 * 7. July 2009. * 8. November 2009 * 9. January, March, and October 2010 * 10. March 2011 * 11. June 2012 * 12. June 2012 * 13. March 2013 * 14. June 2013 * 15. November 2014 * D. ATTRIBUTION ANALYSIS OF THE ATTACKS * E. ANALYSIS * 1. Damage Costs * 2. Establishing Attribution * 3. Cyberattack Responses * F. CONCLUSION * CHAPTER VI - RECOMMENDATIONS * A. CYBER-WARFARE JUS POST BELLUM FRAMEWORK * 1. Outlaw Unethical Cyber Weapons * 2. Add Critical Cyber Infrastructure to the Protected Sites * 3. International Community Involvement * 4. Accountability * a. Punishment * b. Restoration of Affected System and Infrastructure * c. Proportionality * 5. Plans * B. CYBERATTACK RESPONSE * 1. Step 1: Information Gathering * 2. Step 2: Cyberwar * 3. Step 3: International Notification * 4. Step 4: Formal Investigation * 5. Step 5: Attribution * 6. Step 6: Cyberattack Response * 7. Step 7: Recovery * a. Cost Assessment * b. Vulnerabilities Elimination * c. Anti-malware Signatures * d. Restoration * e. Incident Response Planning * f. Education * CHAPTER VII - CONCLUSION

More books from Progressive Management

Cover of the book X-15: Extending the Frontiers of Flight - Encyclopedic History of America's First Hypersonic Rocket-powered Aircraft and Space Plane - Million Horsepower Engine, Muroc, Edwards AFB (Part 2) by Progressive Management
Cover of the book 2011 Deficit Reduction Plans: The Moment of Truth, Final Report of National Commission on Fiscal Responsibility and Reform, Speech by President Obama, House Republican Roadmap by Congressman Ryan by Progressive Management
Cover of the book A-10 Thunderbolt II (Warthog) Systems Engineering Case Study - Close Air Support (CAS) Aircraft by Progressive Management
Cover of the book The Roswell Incident: Case Closed, The Official Air Force Report on Alleged UFO Crash Sites and Alien Bodies from 1947 - Witness Statements, High Dive and Excelsior, Secret Experiments by Progressive Management
Cover of the book Fort Leavenworth: The People Behind the Names: People Who Have Left Their Mark on the Dowager Queen of Frontier Forts – Fort History, Geography, Buildings, Stained Glass Windows, Streets and Trails by Progressive Management
Cover of the book A Theater Approach to Low Intensity Conflict: CLIC Papers - Middle East, Southern Africa, Horn of Africa, Central Asia, Persian Gulf, Pacific Rim, Central America, Caribbean, Terrorism, Drugs by Progressive Management
Cover of the book The Strategic Defense Initiative and the End of the Cold War: SDI, Star Wars, President Reagan, Fall of the Soviet Union, Gorbachev, KAL 007, MAD Nuclear Policy, Teller, ABM Treaty, Reykjavik Summit by Progressive Management
Cover of the book Space Shuttle NASA Mission Reports: 1989 Missions, STS-29, STS-30, STS-28, STS-34, STS-33 by Progressive Management
Cover of the book 21st Century U.S. Military Manuals: Military Police Law and Order Operations FM 19-10 - Patrols, Working Dog Teams, Investigations (Value-Added Professional Format Series) by Progressive Management
Cover of the book 20th Century Spy in the Sky Satellites: Secrets of the National Reconnaissance Office (NRO) Volume 5 - NRO Leaders, Founders, Pioneers, and the Robert Perry History Volume IV by Progressive Management
Cover of the book 2010 American Nuclear Posture Review: Nuclear Weapons Policy Changes by the Obama Administration, Nonproliferation and Terrorism, Sustaining the Nuclear Arsenal, Security Strategy by Progressive Management
Cover of the book Defense Science Board Task Force Report: Force Protection in Urban and Unconventional Environments: Training Regime, Tactical Intelligence, Red Teaming, Role for Technology, SSTR Operations by Progressive Management
Cover of the book 21st Century U.S. Military Documents: Red Horse Program (Air Force Instruction 10-209) - Rapid Engineer Deployable Heavy Operational Repair Squadron Engineers, Mobile Heavy Engineering by Progressive Management
Cover of the book 21st Century U.S. Military Manuals: Opposing Force OPFOR Worldwide Equipment Guide (WEG) Part 11 - Airspace and Air Defense Systems, Manpads, Russian SAM, Countermeasures, Technology Trends by Progressive Management
Cover of the book Anti-Submarine Warfare: What is its Role in the New Maritime Strategy? ASW, Deterrence and Forward Deployment, SSK Capability Trends of Threat Countries, LCS, MH-60S/R, UUVs, Virginia class SSN, MMA by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy