Understanding Cyber Collateral Damage

نویسندگان

  • Sasha Romanosky
  • Zachary Goldman
چکیده

INTRODUCTION In conventional (kinetic) U.S. warfare, there exists a standard methodology for identifying and assessing collateral damage (i.e. accidental damage to civilian targets). Indeed, the U.S. Department of Defense (DoD) relies on a governing document that defines the policy regarding unlawful military targets (no-strike targets), and methods for estimating collateral damage from kinetic military operations. The definitions in this document are clear, and the harms against which it aims to protect are tangible because they relate to persons and property. The munitions in the military’s arsenal are defined and well-known, and their properties – blast radius, amount of force delivered, and the like – are well understood. While accidents of course do occur, the anticipated effects of a kinetic operation (collateral or otherwise), are generally straightforward to anticipate, assess, and manage.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Ethics of Cyberweapons in Warfare

The author discusses the ethical issues of using cyberweapons, software that attacks data and other software during warfare. Many people assume these are relatively benign weapons, but we argue that they can create serious harms like any weapon. He defines cyberweapons and describes them in general terms, and survey their status as per the laws of war. He then discusses the unreliability of cyb...

متن کامل

Tradeoffs of Service, Security and Attack for Cyber System Survivability

Tradeoffs within the limitation of given system resources often have to be made for a cyber system to sustain its more critical services under the damage of cyber attacks. Understanding and modeling cause-effect dynamics of activities (service, security and attack), system state and Quality of Service (QoS) are essential to establish the dynamic adaptation capability of making tradeoffs among s...

متن کامل

Common Structures of Asset-backed Securities and Their Risks

In recent years, one area of growing concern in corporate governance is the accounting and transfer of risk using special purpose entities (or trusts). Such entities are used widely in issuing asset-backed securities. This paper provides an overview of the asset-backed securities market, and discusses the common structures used in this market to transform the risks associated with the underlyin...

متن کامل

Assuring Industrial Control System (ICS) Cyber Security

Industrial Control Systems (ICS) are an integral part of the industrial infrastructure providing for the national good. These systems include Distributed Control Systems (DCS) Supervisory Control and Data Acquisition systems (SCADA), Programmable Logic Controllers (PLC), and devices such as remote telemetry units (RTU), smart meters, and intelligent field instruments including remotely programm...

متن کامل

Preparing for Cyber Threats with Information Security Policies

Contemporary organisations in any industry are increasingly dependent on information systems. Today most organisations are online all the time, and their internal systems are used in environments that are already or easily connected to the internet. The paper analyses cyber threats and their potential effect on the operations of different organisations with the use of scenario analysis. The sce...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017