Preview

Pros And Cons Of Cyber Attacks

Good Essays
Open Document
Open Document
843 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Pros And Cons Of Cyber Attacks
Should cyber-attacks by a nation-state be considered 'armed' attacks? Justify your answer. As cyber-attacks related to information warfare have increased throughout the twenty first century we have seen a rise the use of cyber-attacks by nation states. These nation state attackers focus on targeting other nations in the hope of disrupting the nation’s economy, causing public panic, or crippling a country defenses along with many other goals which damage a nation. These attacks in turn allow the nation state which performed the attack to weaken the other nation, make political statement, steal nation’s information or resource, or use the attacks as a greater warfare plan. This often raises the question when discussing nation state cyber-attacks …show more content…
IF the aforementioned is met the cyber-attack is an armed attack and self-defense retaliation is permitted according to the United Nations. If this level of force is not met and the potential of property damage or loss of life is not present the cyber-attack is no longer can be considered an armed attack, but is instead an act of aggression and self-defense retaliation is not permitted. Regardless of if a nation state cyber-attack is considered an armed attack, it is important for the nation to consider the potential effect of the attack and the potential results which self-defense retaliation may incur before …show more content…
(2012). “Inside Cyber Warfare”. 1005 Gravenstein Highway North,
Sebastopol, CA 95472, USA: O’Reilly Media Inc.
Hertz, Eli. (2009). “Article 51 - The Right to Self-Defence”. Retrieved From: http://www.mythsandfacts.org/media/user/documents/article-51-document.pdf Kaplan, Fred. (2016). “Dark Territory, The Secret History of Cyber War”. 1230
Avenue of the Americas, New York, NY 10020, USA: Simon and Schuster
Libicki, Martin C. (2007). “Conquest in Cyberspace”. 32 Avenue of the Americas,
New York, NY 10013-2473, USA: Cambridge University Press.
ÖyküIrmakkesen. (2014, August). “The Notion of Armed Attack under the UN
Charter and the Notion of International Armed Conflict – Interrelated or Distinct?”. Retrieved From:

You May Also Find These Documents Helpful

  • Best Essays

    INTL 440 Syllabus LDD Jan 14

    • 2263 Words
    • 11 Pages

    This course provides an overview of cyber warfare and the potential impact of its use by military, terrorist, and criminal organizations. By studying the operation of computer networks, the student will gain an appreciation of how they have both benefited society and made portions of its infrastructure more vulnerable. An overview of cyber weaponry will be presented, and various offensive and defensive strategies will be examined via case studies.…

    • 2263 Words
    • 11 Pages
    Best Essays
  • Better Essays

    A cyber-attack is a deliberate exploitation of computer systems, technology-dependent enterprises, and networks (Janssen, n.d.). There are 11 potential security threats thought to be the top security threats for 2013; targeted attacks and cyber-espionage, hacktivism, nation-state-sponsored cyber-attacks, legal surveillance tools, clouds and malware, privacy threats, fake security certificates, ransomeware spreading globally, MAC OS malware, mobile malware, and vulnerabilities and exploits (Davis, 2013). Symantec’s 2013 Internet Security Threat report finds that there was a 42% increase in targeted attacks in 2012…

    • 1317 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Our experience in the war on terror (WOT) reinforces the fact that protecting the Nation and its global interests requires more than passive defensive measures. The threats posed by terrorist groups and rogue states, especially those that gain access to WMD, mandate a swift offense.…

    • 1070 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Final Exam Paper

    • 491 Words
    • 2 Pages

    True or False: Cyberterrorism has thus far been largely limited to acts such as the defacement of NATO Web pages during the war in Kosovo.…

    • 491 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The 16 critical infrastructure sectors identified by the Department of Homeland Security (DHS) include; Chemical, Commercial facilities, Communications, Critical manufacturing, Dams, Defense industrial base, Emergency services, Energy, Financial services, Food and agriculture, Government facilities, Health care and public health, Information technology, Nuclear reactors, nuclear materials, and waste, Transportation systems, and Water and wastewater systems. Technological advancement, increasing use of the internet, coupled with the interdependencies of information technology had and continue to have a direct effect on critical infrastructure attacks. These attacks and threats unfortunately have grown and sophisticated level of cyberattacks…

    • 323 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Electric grids, power plants, hospitals, etc., rely largely on computers and the internet to store and access data. If the security to these facilities are breached, skewed data and power outages are a real possibility. Therefore, it could lead to serious economic problems, and possibly, even death. With all that said, cyberwarfare is not something to be taken lightly, in fact, the dangers are extremely significant. Additionally, since technology is so prominent, it is a convenient method of…

    • 445 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    “We are now faced with a combination of new and traditional actors, a widened set of motivations and tactics, organizational structures and principles, as well as a wider range of threats along the technological spectrum, especially with the increased potential for the terrorists use of weapons of mass destruction. Counter terrorism must deal with a wider range of threats…

    • 2278 Words
    • 10 Pages
    Powerful Essays
  • Best Essays

    Before we address any issues relating cyber-security, we must look at the definition of the term in the first place. According to Wikipedia, cyber-security is called as computer security which is described as information…

    • 3699 Words
    • 15 Pages
    Best Essays
  • Powerful Essays

    Certain cyber crimes have the potential of becoming more severe, leading to cyber warfare. Cyber warfare are actions made by another state or nation to cause disruption or damage to another state or nations networks or computers. Government infrastructures are at risk for cyber-related…

    • 1134 Words
    • 5 Pages
    Powerful Essays
  • Better Essays

    Power Grid

    • 1857 Words
    • 5 Pages

    But with all the good that comes from information technology there is also bad. The internet has also become a gateway for hackers to wreak havoc. In a nutshell, cyber-crime has become a headache in the 21st century because one individual can remotely attack any online system from any corner of the world crippling many economic developments. Even before the federal government can come up with effective ways of protecting its citizen from cyber-crime vulnerability, a new problem which can bring about devastating effects of equal measure has emerged. One such problem is the vulnerability of the nation’s power grid. The government had turned all of its attention to measures of countering cyber terrorism to an extent that it forgot that physical attacks on sources of power, which run these systems, could also bring equally devastating effects (Besanger et al 2013).…

    • 1857 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    “The main reason for this controversy is that cyber-threats have not materialized as a national security threat, even granted that there have been some few incidents with at least some potential for grave consequences. Interestingly enough, both hypers and de-hypers tend to agree on this point. But while the first group assumes that vicious attacks that wreak havoc and paralyze whole nations are imminent, more cautious researchers often point to the practical difficulties of a serious cyberattack (Ingles-le Nobel,…

    • 677 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Arguments Against Kaplan

    • 940 Words
    • 4 Pages

    The effects of attacks can be described by four levels of national security concern with the first level being disruption of communications, economic transactions, public information campaigns, electric power grids, and political negotiations. Second is the threat of exploitation of sensitive, proprietary, or classified information. Third is the threat of manipulation of information for political, economic, or military purposes and last is the threat of destruction of information or critical infrastructure…

    • 940 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    American Government

    • 328 Words
    • 2 Pages

    Contention 2) Cyber attacks are dilemmas that can be prohibited. Subpoint A: There are many ways for the United States to be attacked by terrorists other than the bombings itself, they are called Cyber Attacks. Cyber Attacks are an attempt by hackers to damage or destroy a computer network or system. These are attacks that can affect us deeply because Americans today are becoming more and more dependent on the internet. Though the government of America has much of it’s private information recorded on paper, yes but much is saved on the Internet as backup. With this, terrorist groups hire hackers or even study about computers to be able to launch a Cyber Attack that would help them steal and even look through the information to give them an advantage. With them knowing the key aspects of the government that would help them to bring even more danger upon not only the government but also the Citizens and other individuals that live here in our country. With cyber attacks it would lead to Cyber Warfare. Cyber warfare can be like any other war, just because it isn’t being fought face to face or weapons being involved it is of high danger either way. With this,the enemies can find ways to hurt us as a country, cause damage that would take years to recovers just like 9/11.Which would cause wars amongst the nations/countries. As Martin C. Libicki from the RAND corporation states “ Because much of what goes on in cyberspace is invisible, what one state perceives as normal operating procedure, another could perceive as just about anything.” With this he means even if one self may think what they put on the internet even with high security, others can use it for anything even if the person may think it’s harmful. The U.S. has been receiving cyber attacks from china which has leaded us to enormous losses to U.S. jobs states Senator Brown…

    • 328 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Cyberbully Pros And Cons

    • 1037 Words
    • 5 Pages

    A case that highlighted the dark side cyberbullying was United States of America v. Lori Drew, where Drew in 2008 was indicted for Conspiracy, Accessing Protected Computer to Obtain Information and, Aiding and Abetting, and Causing an Act to be Done. Drew, 49, created a MySpace account in September 2006, and pretend to be a 16 year old boy named "Josh Evens" with the intention of harassing Megan Meier, a 13 year old girl, an ex-friend of Drew’s daughter Sarah. The initial communication was flirtatious and Meier became emotionally attached to "Josh". Drew used this emotional connection to cause pain to Meir by having “Josh” tell her the world would be a better place without her. Other profiles linked to "Josh" also sent mean spirted messages…

    • 1037 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Irls

    • 2330 Words
    • 10 Pages

    “Cyber terrorism has become one of the most significant threats to the national and international security of the modern state, and cyber attacks are occurring with increased frequency. The Internet not only makes it easier for terrorists to communicate, organize terrorist cells, share information, plan attacks, and recruit others but also is increasingly being used to commit cyber terrorist acts. It is clear that the international community may only ignore cyber terrorism at its peril.” (Kelly G. 2010)…

    • 2330 Words
    • 10 Pages
    Powerful Essays