首页> 外文会议>European Conference on Cyber Warfare and Security >A Legal Understanding of State-Linked Cyberattacks and Malicious Cyber Activities
【24h】

A Legal Understanding of State-Linked Cyberattacks and Malicious Cyber Activities

机译:对国家联系的网络图案和恶意网络活动的法律理解

获取原文

摘要

Many countries have fallen victim to state-linked cyberattacks and malicious activities. State-linked cyber operations pose serious legal threats and challenges to the stability and security of cyberspace. The discussion aims to establish a legal understanding pertaining to the differences and similarities between state-linked cyber operations such as cyberattacks and malicious cyber activities. In many instances, the terms are used interchangeably. Conduct that may be considered as malicious activities are referred to as cyberattacks. However, cyberattacks and malicious activities are not the same and the consequences and motive for the state-linked cross-border cyber operation may differ. State-linked cyberattacks is defined as a cyber operation that is reasonably expected to cause injury or death to persons or damage or destruction to objects such as DDoS attacks or ransomware attacks. State-linked malicious cyber activities consist of theft of information (espionage), disinformation and false websites. Malicious activities do not cause physical harm to persons or objects. However, the harm in the instance of espionage may consist of financial loss and/or undermining trust in the ability of the government to protect sensitive information or sowing political and social discord such as interference in another country's elections or referendums. Cyber operations evoke various debatable questions such as how should a victim state respond to state-linked cyber operations and when does state behaviour in a foreign cyberspace constitute an act of cyber war or information war? Drawing a clear distinction is relevant when it comes to a victim state's response to a foreign state's cyber operation in their cyberspace on national, international and global level. Stability and security in cyberspace may be achieved by means of international norms governing state behaviour specifically cross-border cyber operations. Although a country should not abuse the cyberspace of another country, the discussion debates the negotiation and enforcement of cyber norms governing state behaviour and how countries should respond to unlawful cyber operations on national and global level.
机译:许多国家将受害者落在州联系的网络攻击和恶意活动中。国家联系的网络行动对网络空间的稳定和安全构成了严重的法律威胁和挑战。讨论旨在建立与诸如网络攻击和恶意网络活动等国家联系的网络行动之间的差异和相似性有关的法律谅解。在许多情况下,这些术语可互换使用。可能被视为恶意活动的行为被称为Cyber​​Actacks。然而,网络内人和恶意活动是不一样的,国家链接跨境网络运作的后果和动机可能不同。国家链接的网络攻击被定义为网络操作,这是合理的预期,对人员或损坏或毁坏或对DDOS攻击或赎金软件攻击等对象造成伤害或死亡。国家链接的恶意网络活动包括盗窃信息(间谍),虚假信息和虚假网站。恶意活动不会对人或物体造成身体伤害。但是,间谍活动中的危害可能包括财务损失和/或破坏政府保护敏感信息或播种政治和社会不和谐的能力,例如在另一个国家选举或公民投票中的干扰。网络行动唤起各种可辩论的问题,例如受害者国家如何应对国家联系的网络行动,以及外国网络空间中的国家行为何时构成了网络战或信息战的行为?当涉及到受害者国家在国家,国际和全球层面的网络空间中对外国网络运作的反应时,有所明确的区别是相关的。网络空间中的稳定性和安全性可以通过管理国家行为特别跨境网络行动来实现。虽然一个国家不应该滥用另一个国家的网络空间,但讨论辩论了谈判和执法网络规范治理国家行为以及各国应该如何应对国家和全球层面的非法网络行动。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号