Cyber Warfare: Jus Post Bellum - Problem of Cyber Attack Accountability, International Treaties for Post-Conflict Period, Comparison to Traditional Warfare, 1998 Kosovo and 2003 Iraq Wars, North Korea

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Cyber Warfare: Jus Post Bellum - Problem of Cyber Attack Accountability, International Treaties for Post-Conflict Period, Comparison to Traditional Warfare, 1998 Kosovo and 2003 Iraq Wars, North Korea by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9781370885817
Publisher: Progressive Management Publication: November 29, 2016
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9781370885817
Publisher: Progressive Management
Publication: November 29, 2016
Imprint: Smashwords Edition
Language: English

This excellent report has been professionally converted for accurate flowing-text e-book format reproduction. There is a lack of attention to the aftermath of a deployed cyber weapon: There is no mechanism for the assignment of accountability for the restoration of affected infrastructure and remediation of violation of established laws of war after cyberattacks occur. This study analyzes International Humanitarian Law and international treaties as they apply to the cyber post-conflict period and explores current jus post bellum frameworks, which can be used to design a cyber-warfare jus post bellum framework. It also analyzes analogies to traditional warfare in the damage assessment and aid provided during the recovery period of the 1998 Kosovo and the 2003 Iraq Wars. It also discusses the available international cyber organizations. As an example, the study analyzes responses to cyberattacks in a case study involving South Korea and North Korea.
Additionally, this study examines the related issues of the effects of deploying a cyber-weapon, the ways to establish acceptable levels of attribution, the challenges of cyber-damage assessments, and the ability to contain and reverse cyberattacks. This thesis proposes a cyber-warfare jus post bellum framework, with emphasis on prevention and cyber weapons control, proposes cyberattack relief-effort actions, and offers a post-cyberattack cost checklist.

CHAPTER I - INTRODUCTION * A. CYBER WARFARE: JUS POST BELLUM FRAMEWORK DEVELOPMENT JUSTIFICATION * B. THESIS PURPOSE * C. THESIS OUTLINE * CHAPTER II - BACKGROUND * A. INTERNATIONAL HUMANITARIAN LAW * B. JUS POST BELLUM * C. JUS POST BELLUM IN CYBERSPACE * D. TREATIES AND ARTICLES APPLICABLE TO JUS POST BELLUM * 1. Hague Conventions * 2. Geneva Convention * 3. Conventions Prohibiting Certain Conventional Weapons * 4. Additional Treaties Prosecutable for War Crimes * 5. Genocide * 6. Mercenaries * 7. Additional Rights Violations * 8. UN Charter * a. Article 39 * b. Article 51 * c. Article 92 * d. Article 94 * 9. Statute of the ICJ * a. Article 36 * b. Article 38 * c. Article 41 * 10. ICC * 11. NATO * E. CONCLUSION * CHAPTER III - CYBERATTACKS * A. TYPES OF CYBERATTACKS * B. CYBERATTACK VECTORS * C. CYBERATTACK EFFECTS * D. CYBER-WEAPON DAMAGE ASSESSMENT * E. ATTRIBUTION * F. CONTAINABILITY AND REVERSIBILITY OF CYBER WEAPONS * G. CONCLUSION * CHAPTER IV - PAST KINETIC OPERATIONS * A. STABILITY OPERATIONS * B. DAMAGE ASSESSMENT KINETIC VERSUS CYBER * 1. Jus Post Bellum Cost * 2. Entities Involved in Reconstructions * a. 2003 Iraq War * b. 1998 Kosovo War * C. INTERNATIONAL CYBER ORGANIZATIONS * D. CONCLUSION * CHAPTER V - CASE STUDY: NORTH KOREAN CYBERATTACKS * A. INTRODUCTION * B. NORTH KOREA * C. NORTH-KOREA SUSPECTED CYBERATTACKS * 1. July 2004 * 2. August/September 2005 * 3. July 2006 * 4. October 2007 * 5. September 2008 * 6. March 2009 * 7. July 2009. * 8. November 2009 * 9. January, March, and October 2010 * 10. March 2011 * 11. June 2012 * 12. June 2012 * 13. March 2013 * 14. June 2013 * 15. November 2014 * D. ATTRIBUTION ANALYSIS OF THE ATTACKS * E. ANALYSIS * 1. Damage Costs * 2. Establishing Attribution * 3. Cyberattack Responses * F. CONCLUSION * CHAPTER VI - RECOMMENDATIONS * A. CYBER-WARFARE JUS POST BELLUM FRAMEWORK * 1. Outlaw Unethical Cyber Weapons * 2. Add Critical Cyber Infrastructure to the Protected Sites * 3. International Community Involvement * 4. Accountability * a. Punishment * b. Restoration of Affected System and Infrastructure * c. Proportionality * 5. Plans * B. CYBERATTACK RESPONSE * 1. Step 1: Information Gathering * 2. Step 2: Cyberwar * 3. Step 3: International Notification * 4. Step 4: Formal Investigation * 5. Step 5: Attribution * 6. Step 6: Cyberattack Response * 7. Step 7: Recovery * a. Cost Assessment * b. Vulnerabilities Elimination * c. Anti-malware Signatures * d. Restoration * e. Incident Response Planning * f. Education * CHAPTER VII - CONCLUSION

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This excellent report has been professionally converted for accurate flowing-text e-book format reproduction. There is a lack of attention to the aftermath of a deployed cyber weapon: There is no mechanism for the assignment of accountability for the restoration of affected infrastructure and remediation of violation of established laws of war after cyberattacks occur. This study analyzes International Humanitarian Law and international treaties as they apply to the cyber post-conflict period and explores current jus post bellum frameworks, which can be used to design a cyber-warfare jus post bellum framework. It also analyzes analogies to traditional warfare in the damage assessment and aid provided during the recovery period of the 1998 Kosovo and the 2003 Iraq Wars. It also discusses the available international cyber organizations. As an example, the study analyzes responses to cyberattacks in a case study involving South Korea and North Korea.
Additionally, this study examines the related issues of the effects of deploying a cyber-weapon, the ways to establish acceptable levels of attribution, the challenges of cyber-damage assessments, and the ability to contain and reverse cyberattacks. This thesis proposes a cyber-warfare jus post bellum framework, with emphasis on prevention and cyber weapons control, proposes cyberattack relief-effort actions, and offers a post-cyberattack cost checklist.

CHAPTER I - INTRODUCTION * A. CYBER WARFARE: JUS POST BELLUM FRAMEWORK DEVELOPMENT JUSTIFICATION * B. THESIS PURPOSE * C. THESIS OUTLINE * CHAPTER II - BACKGROUND * A. INTERNATIONAL HUMANITARIAN LAW * B. JUS POST BELLUM * C. JUS POST BELLUM IN CYBERSPACE * D. TREATIES AND ARTICLES APPLICABLE TO JUS POST BELLUM * 1. Hague Conventions * 2. Geneva Convention * 3. Conventions Prohibiting Certain Conventional Weapons * 4. Additional Treaties Prosecutable for War Crimes * 5. Genocide * 6. Mercenaries * 7. Additional Rights Violations * 8. UN Charter * a. Article 39 * b. Article 51 * c. Article 92 * d. Article 94 * 9. Statute of the ICJ * a. Article 36 * b. Article 38 * c. Article 41 * 10. ICC * 11. NATO * E. CONCLUSION * CHAPTER III - CYBERATTACKS * A. TYPES OF CYBERATTACKS * B. CYBERATTACK VECTORS * C. CYBERATTACK EFFECTS * D. CYBER-WEAPON DAMAGE ASSESSMENT * E. ATTRIBUTION * F. CONTAINABILITY AND REVERSIBILITY OF CYBER WEAPONS * G. CONCLUSION * CHAPTER IV - PAST KINETIC OPERATIONS * A. STABILITY OPERATIONS * B. DAMAGE ASSESSMENT KINETIC VERSUS CYBER * 1. Jus Post Bellum Cost * 2. Entities Involved in Reconstructions * a. 2003 Iraq War * b. 1998 Kosovo War * C. INTERNATIONAL CYBER ORGANIZATIONS * D. CONCLUSION * CHAPTER V - CASE STUDY: NORTH KOREAN CYBERATTACKS * A. INTRODUCTION * B. NORTH KOREA * C. NORTH-KOREA SUSPECTED CYBERATTACKS * 1. July 2004 * 2. August/September 2005 * 3. July 2006 * 4. October 2007 * 5. September 2008 * 6. March 2009 * 7. July 2009. * 8. November 2009 * 9. January, March, and October 2010 * 10. March 2011 * 11. June 2012 * 12. June 2012 * 13. March 2013 * 14. June 2013 * 15. November 2014 * D. ATTRIBUTION ANALYSIS OF THE ATTACKS * E. ANALYSIS * 1. Damage Costs * 2. Establishing Attribution * 3. Cyberattack Responses * F. CONCLUSION * CHAPTER VI - RECOMMENDATIONS * A. CYBER-WARFARE JUS POST BELLUM FRAMEWORK * 1. Outlaw Unethical Cyber Weapons * 2. Add Critical Cyber Infrastructure to the Protected Sites * 3. International Community Involvement * 4. Accountability * a. Punishment * b. Restoration of Affected System and Infrastructure * c. Proportionality * 5. Plans * B. CYBERATTACK RESPONSE * 1. Step 1: Information Gathering * 2. Step 2: Cyberwar * 3. Step 3: International Notification * 4. Step 4: Formal Investigation * 5. Step 5: Attribution * 6. Step 6: Cyberattack Response * 7. Step 7: Recovery * a. Cost Assessment * b. Vulnerabilities Elimination * c. Anti-malware Signatures * d. Restoration * e. Incident Response Planning * f. Education * CHAPTER VII - CONCLUSION

More books from Progressive Management

Cover of the book Wildland Fire and Aviation Program Management Operations Guide: Wildfire Prevention, Firefighting Equipment, Smokejumpers, Prescribed Burns, Suppression Chemicals, Delivery Systems by Progressive Management
Cover of the book FEMA U.S. Fire Administration The Changing Face of the Fire Service: A Handbook on Women in Firefighting - Recruitment, Reproductive Issues, Sexual Harassment, Protective Clothing by Progressive Management
Cover of the book 21st Century Pediatric Cancer Sourcebook: Childhood Ependymoma, Subependymoma - Clinical Data and Practical Information for Patients, Families, and Physicians by Progressive Management
Cover of the book 21st Century FEMA Study Course: Emergency Support Function #4 Firefighting (IS-804) - NRF, Forest Service, Hotshot Crews, Wildland Fires, Structural Fires, National Interagency Fire Center (NIFC) by Progressive Management
Cover of the book Essential Guide to General James "Mad Dog" Mattis: The Mattis Way of War, an Examination of Operational Art in Task Force 58 and 1st Marine Division, Overextended Example of Effects-Based Operations by Progressive Management
Cover of the book 21st Century U.S. Military Manuals: The U.S. Army Training and Doctrine Command Concept Development Guide - TRADOC Pamphlet 71-20-3 (Professional Format Series) by Progressive Management
Cover of the book Explosive Accident Summary: World War II - Foundation of Ordnance Safety Program, Log of Major Accidents in Second World War, Plant Disasters, Ship Explosions, Reporting Future by Progressive Management
Cover of the book An Analysis of the FARC in Colombia: Breaking the Frame of FM 3-24 - From the Beginnings of the FARC to the Present, Guerrilla Insurgency, Doctrinal Gaps, Summary of Narrative and Strategy by Progressive Management
Cover of the book Agricultural Bioterrorism: A Federal Strategy to Meet the Threat - USDA, Agroterrorism, Bioterror History, Superweeds, Superbugs, Emerging Threat to Food Security, Biowarfare by Progressive Management
Cover of the book One Valley at a Time - Success Story of the Afghanistan Counterinsurgency (COIN) Campaign Against Taliban and al-Qaeda Terrorists, Special Operations Forces (SOF), Civil Military Operations (CMO) by Progressive Management
Cover of the book 21st Century U.S. Military Manuals: Counterinsurgency (COIN) Field Manual (FM 3-24) Tactics, Intelligence, Airpower by Petraeus - Plus Bonus IED Coverage (Value-added Professional Format Series) by Progressive Management
Cover of the book Over There with the AEF (American Expeditionary Force): The World War I Memoirs of Captain Henry C. Evans – French Campaigns Aisne-Marne, St. Mihiel, Meuse Argonne, Battle at the Front by Progressive Management
Cover of the book The Limitless Sky: Air Force Science and Technology Contributions to the Nation - GPS, Precision-Guided Munitions, Radar, Space, Missiles, Rocket Planes, Lifting Bodies, Satellites, Directed Energy by Progressive Management
Cover of the book 21st Century U.S. Military Manuals: Stability - Army Doctrine Reference Publication No. 3-07 and Stability Operations Field Manual 3-07 (Professional Format Series) by Progressive Management
Cover of the book Health Service Support: Joint Chiefs of Staff Joint Publication 4-02 - Surgeon's Office, Casualty Management, Medical Logistics, Force Health Protection, Combat Operations, Special Operations Forces by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy