Just Warfare: Is a Nuclear Attack an appropriate Response to a Cyber Attack?

نویسندگان

چکیده

It is well known that nuclear weapons pose a grave threat to humanity because of their destructive power and the lives innocent civilians potentially affected by them. What might be less are effects cyberwarfare can have on state its security. Most systems were designed decades ago, when manipulations computer networks, or cyber-attacks, practically non-existent threat. In present international political situation, where threats about use strategic weapons, been discussed, cyber everywhere, it may expected they will consequences for stability as well. Considering many unknowns continually evolving issues related threats, hard measure how serious risks are, but idea cannot excluded that, over long term, “game-changing” perceived value weapons. Potential this phenomenon include operations targeting development, systems, replacing weapons.
 crucial nation states, such example United States, work prevent cyber-attacks in world we becoming more reliant if disrupted could destroy economy, politics, even military operations. The question, far states willing go protect realm, extent which policies allow possibility response cyberattack, significant issues. This analysis employ distinctions from just war theory, attempt address these Just warfare important developing sense right wrong case unpreventable conflicts avoid further escalation devastating results. other words, what occurs apply ethical War Theory, Cyber Attacks weapons? Can Theory employed create taboo, so protection security creates an obstacle does not lead result attack? also takes into consideration anticipatory research, while argument based considerations without attack having occur first. Anticipatory research foundation preventative measures used argue creation (both domestic international) cyber-attack, therefore eliminating community.
 basic conceptual proceed defining critical terminology anticipated answering Is Nuclear Attack ever appropriate cyberattack?

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cyber Reconnaissance: An Alarm before Cyber Attack

Today’s cyber world is more than the internet. It is interdependent networks containing telecommunication network, embedded system and critical infrastructures. Malicious attacks on critical infrastructure become a major threat to business and government operations. An easy and fast access to network makes business successful and makes sensitive information more vulnerable to cyber thieves. Tod...

متن کامل

AVOIDIT: A Cyber Attack Taxonomy

Cyber attacks have greatly increased over the years, where the attackers have progressively improved in devising attacks towards a specific target. To aid in identifying and defending against cyber attacks we propose a cyber attack taxonomy called AVOIDIT (Attack Vector, Operational Impact, Defense, Information Impact, and Target). We use five major classifiers to characterize the nature of an ...

متن کامل

Cyber Threats Foresight Against Iran Based on Attack Vector

Cyber ​​threats have been extraordinary increased in recent years. Cyber ​​attackers, including government agencies or hackers, have made significant advances in the use of various tools for attacking target systems in some countries particularly on Islamic republic of Iran. The complexity of cyber threats and the devastating effects of them on critical systems highlights necessity of cyber thr...

متن کامل

A survey of Cyber Attack Detection Strategies

Homeland security field deals with diverse subjects, audio processing, video surveillance, image detection, geolocation determination, and cyber attack detection. Audio processing and video surveillance area are significant for public places safety and land border area. However the big threat for homeland security is cyber attacks. Cyber terror attacks and cyber crime attacks may move over virt...

متن کامل

Cyber Safety: A Systems Theory Approach to Managing Cyber Security Risks – Applied to TJX Cyber Attack

To manage security risks more effectively in today’s complex and dynamic cyber environment, a new way of thinking is needed to complement traditional approaches. In this paper we propose a new approach for managing cyber security risks, based on a model for accident analysis used in the Systems Safety field, called System-Theoretic Accident Model and Processes (STAMP). We have adapted and appli...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Proceedings of the ... international conference on information warfare and security

سال: 2023

ISSN: ['2048-9870', '2048-9889', '2048-9897']

DOI: https://doi.org/10.34190/iccws.18.1.1059