Understanding Cyber Collateral Damage
نویسندگان
چکیده
INTRODUCTION In conventional (kinetic) U.S. warfare, there exists a standard methodology for identifying and assessing collateral damage (i.e. accidental damage to civilian targets). Indeed, the U.S. Department of Defense (DoD) relies on a governing document that defines the policy regarding unlawful military targets (no-strike targets), and methods for estimating collateral damage from kinetic military operations. The definitions in this document are clear, and the harms against which it aims to protect are tangible because they relate to persons and property. The munitions in the military’s arsenal are defined and well-known, and their properties – blast radius, amount of force delivered, and the like – are well understood. While accidents of course do occur, the anticipated effects of a kinetic operation (collateral or otherwise), are generally straightforward to anticipate, assess, and manage.
منابع مشابه
The Ethics of Cyberweapons in Warfare
The author discusses the ethical issues of using cyberweapons, software that attacks data and other software during warfare. Many people assume these are relatively benign weapons, but we argue that they can create serious harms like any weapon. He defines cyberweapons and describes them in general terms, and survey their status as per the laws of war. He then discusses the unreliability of cyb...
متن کاملTradeoffs of Service, Security and Attack for Cyber System Survivability
Tradeoffs within the limitation of given system resources often have to be made for a cyber system to sustain its more critical services under the damage of cyber attacks. Understanding and modeling cause-effect dynamics of activities (service, security and attack), system state and Quality of Service (QoS) are essential to establish the dynamic adaptation capability of making tradeoffs among s...
متن کاملCommon Structures of Asset-backed Securities and Their Risks
In recent years, one area of growing concern in corporate governance is the accounting and transfer of risk using special purpose entities (or trusts). Such entities are used widely in issuing asset-backed securities. This paper provides an overview of the asset-backed securities market, and discusses the common structures used in this market to transform the risks associated with the underlyin...
متن کاملAssuring Industrial Control System (ICS) Cyber Security
Industrial Control Systems (ICS) are an integral part of the industrial infrastructure providing for the national good. These systems include Distributed Control Systems (DCS) Supervisory Control and Data Acquisition systems (SCADA), Programmable Logic Controllers (PLC), and devices such as remote telemetry units (RTU), smart meters, and intelligent field instruments including remotely programm...
متن کاملPreparing for Cyber Threats with Information Security Policies
Contemporary organisations in any industry are increasingly dependent on information systems. Today most organisations are online all the time, and their internal systems are used in environments that are already or easily connected to the internet. The paper analyses cyber threats and their potential effect on the operations of different organisations with the use of scenario analysis. The sce...
متن کامل