Which telecom company has accused the US of launching cyber attacks to infiltrate its internal information systems?
Answers from top 10 papers
More filters
Papers (10) | Insight |
---|---|
This would form the foundation for greater international cooperation on information sharing, evidence collection, and criminal prosecution of those involved in cyber-attacks — in short, for a new international law of cyber-attack. | |
9 Citations | The current rise in the number of attempts at launching a cyber attack may represent a new generation of “terrorists” and their discontent with governments, private companies, or with other non-governmental groups. |
18 Citations | The astonishing achievements of cyber crime and cyber espionage – to which law enforcement and counterintelligence have found little answer – hint that more serious cyber attacks on critical infrastructures are only a matter of time. |
24 Citations | The decision to rely on voluntary action for cyber security reflects influential trends in security policies, deregulation, and the government's relation to the Internet that continue to shape US policy even after the attacks of September 11. |
62 Citations | Our finding—that cyber attacks are not (yet) effective as tools of coercion in war—has potentially significant implications for other armed conflicts with a digital front. |
40 Citations | Our findings therefore cast doubt on the credibility of policy maker assertions that cyber attacks will be treated “like any other attack” and more broadly the logic of cyber deterrence that rests on the U. S. having the political resolve to retaliate for a cyber attack. |
99 Citations | Using the market reactions to withheld and disclosed attacks, we estimate that managers disclose information on cyber-attacks when investors already suspect a high likelihood (40%) of an attack. |
01 Jan 2015 25 Citations | Recent reports indicate that cyber-attacks are increasingly likely for the critical infrastructures, e. g., control centers, nuclear power plants, and substations. |
78 Citations | Second, this Article argues that it will be difficult to achieve international agreement on legal interpretation and to enforce it with respect to cyber-attacks. |
This Article concludes that a new, comprehensive legal framework at both the domestic and international levels is needed to more effectively address cyber-attacks. |
Related Questions
How terrorist groups, private companies, and other non-state actors engage in information warfare?5 answersTerrorist groups, private companies, and other non-state actors engage in information warfare through various means, exploiting the power of information to manipulate perceptions and influence outcomes. They utilize unconventional methods that often disregard international conventions and laws, aiming to create psychological effects on target audiences. This form of warfare has evolved into a global, non-contact strategy that can significantly impact public opinion and societal stability. The blurred boundaries between state and non-state actors in cyber operations pose challenges for legal frameworks, making it difficult to regulate and prosecute cybercrimes effectively. Understanding the diverse tactics and strategies employed in information warfare is crucial for countering its effects and safeguarding both individuals and nations.
Why did the United States attack Iran with Stuxnet?5 answersThe United States attacked Iran with Stuxnet as a covert cyber operation to disrupt Iran's nuclear enrichment program. Stuxnet, a sophisticated worm, targeted specific models of Siemens Programmable Logic Controllers (PLCs) connected to Iran's nuclear equipment, altering their programming to cause malfunctions and potentially sabotage the nuclear facilities. This attack marked a significant development in cyber warfare, demonstrating the potential for physical damage across international boundaries. Offensive cyber operations, like Stuxnet, have become a key component of foreign policies, especially for major powers like the US. The use of Stuxnet highlights the intersection of geopolitics and technology, showcasing how cyberspace is utilized to achieve international security objectives through covert means.
What are the different types of insider threats?4 answersInsider threats can be categorized into different types based on three insider traits: predictability, susceptibility, and awareness. The proposed framework identifies eight insider threat types and provides insights into how to gauge these traits and their relation to the different types of threats. Traditional rule-based approaches for detecting insider threats are not flexible or robust, so user behavior modeling and anomaly detection algorithms are proposed as detection methods. These methods utilize user log data and apply anomaly detection algorithms to detect malicious activities. Insider threat programs often focus on technical indicators and miss the human side of the problem, but recent studies aim to integrate behavioral indicators of insider threat risk. A privilege-oriented perspective is suggested for defining insiders and insider threats, focusing on the insider's intention to misuse privileged access or knowledge. Insiders, due to their intimate knowledge of an organization, pose a threat to information security by violating security policies or obtaining unauthorized access.
What is Cybersecurity and Insider Threats?3 answersCybersecurity refers to the measures and practices taken to protect computer systems and networks from unauthorized access, data breaches, and other malicious activities. It involves safeguarding information and technology assets from cyber threats, such as hacking, malware, and phishing attacks. Insider threats, on the other hand, are a specific type of cybersecurity risk that arise from individuals within an organization who have authorized access to its resources. These insiders, whether employees, partners, or customers, can intentionally or unintentionally misuse their access to cause harm to the organization's mission, resources, personnel, or systems. Insider threats are a significant concern in various fields, including biomedical sciences, synthetic biology, artificial intelligence, and food production engineering. Understanding the motivations, behaviors, and methods of insiders is crucial for detecting, mitigating, and reducing the risk of insider threats.
How can I complain in cyber cell?7 answers
How to join cyber cell up?5 answers