All political and military conflicts now have a cyber dimension, the size and impact of which are difficult to predict. Internet-enabled propaganda, espionage and attacks on critical infrastructure can target decision makers, weapons systems and citizens in general, during times of peace or war. Traditional threats to national security now have a digital delivery mechanism which would increase the speed, diffusion and power of an attack. There have been no true cyber wars to date, but cyber battles of great consequence are easy to find. This book is divided into two sections – Strategic Viewpoints and Technical Challenges & Solutions – and highlights the growing connection between computer security and national security.
IOS Press is an international science, technical and medical publisher of high-quality books for academics, scientists, and professionals in all fields.
Some of the areas we publish in:
-Databases and information systems
-All aspects of physics
-The knowledge economy
-Understanding and responding to terrorism
Recent years have seen a rapid development of a relatively new trend of battle: cyber-warfare. Used in targeting various official government websites, home pages of financial institutions and famous and influential internet portals, cyber-attacks have the ability to paralyze the work of banks, news broadcasts and even hurt the reputation of a country (like in the case of Georgia), with false and distorted information and data being the main casualties. This book gives an insight on the highly interesting topic of cyber-warfare, the latest form of battle.
Technology is an essential part of society in the Information Age. Warfare has always had a technological dimension. In the era of information and the interconnected world, the critical infrastructure of nations has become increasingly reliant upon computer networks: by using the methods of computer network attacks many critical functions of a State could be damaged. This has raised a discussion related to States' national and economic security concerning a new battlefield, warfare in cyberspace.
This report surveys one new facet of technology: computer network attacks, from the framework of the law of armed conflict by asking if the existing law of armed conflict, the main parts of which have their origins in the legacies of two World Wars, applies to computer network attacks. Moreover, the report addresses the questions of the perpetrators of the computer network attacks in the context of the law of armed conflict, what targets can be attacked with the means and methods of computer network attacks and how these attacks should be conducted under the laws of armed conflict.