A Critical Analysis Of The Applicability Of International Humanitarian Law In The Context Of Cyber Warfare

SSA Research LUCKY JONASI 61 PAGES (16560 WORDS) Dissertation
Subscribe to access this work and thousands more

Contents

CHAPTER ONE: INTRODUCTION .................................................................................................................... 1

1.1 INTRODUCTION ................................................................................................................................... 1

1.2 BACKGROUND ..................................................................................................................................... 1

1.3 PROBLEM STATEMENT ........................................................................................................................ 4

1. 4 OBJECTIVES ........................................................................................................................................ 4

1.5 LITERATURE REVIEW ........................................................................................................................... 5

1.6 METHODOLOGY .................................................................................................................................. 6

1.7 CHAPTER SYNOPSIS ............................................................................................................................. 6

CHAPTER TWO: THE CONCEPT OF CYBER WARFARE .................................................................................... 8

2.1 INTRODUCTION ................................................................................................................................... 8

2.2 CYBERSPACE ........................................................................................................................................ 8

2.3 COMPUTER NETWORKS ATTACK (or CNA) .......................................................................................... 9

2.4 CYBER-ATTACK .................................................................................................................................... 9

2.5 CYBER OPERATION ............................................................................................................................ 10

2.6 CYBER WARFARE ............................................................................................................................... 10

2.7 EXAMPLES OF CYBER-ATTACKS ......................................................................................................... 11

The Estonian Attack in 2007 ............................................................................................................... 11

The Georgian Attack 2008................................................................................................................... 12

Stuxnet ................................................................................................................................................ 12

Red October ........................................................................................................................................ 13

2.8 UNIQUE CHARACTERISTICS OF CYBER WARFARE ............................................................................. 13

2.9 CONCLUSION ..................................................................................................................................... 15

CHAPTER THREE: CYBER WARFARE AND INTERNATIONAL LAW ................................................................ 16

3.1 INTRODUCTION ................................................................................................................................. 16

3.2 APPLICABILITY OF THE EXISTING RULES ............................................................................................ 16

3.3. PROHIBITION OF THE USE OF FORCE UNDER INTERNATIONAL LAW .............................................. 17

3.3.1 NOTION OF 'FORCE' ................................................................................................................... 17

3.3.2 CYBER OPERATION AS USES OF FORCE ...................................................................................... 17

3.3.3 CYBER ASSISTANCE AS FORCE .................................................................................................... 19

3.3.4 ECONOMIC OR POLITICAL FORCE .............................................................................................. 19

3.4 CYBER OPERATION AS ARMED ATTACKS AND THE RIGHT TO SELF-DEFENCE .................................. 20

Subscribe to access this work and thousands more
Overall Rating

0

5 Star
(0)
4 Star
(0)
3 Star
(0)
2 Star
(0)
1 Star
(0)
APA

SSA, R (2021). A Critical Analysis Of The Applicability Of International Humanitarian Law In The Context Of Cyber Warfare. Afribary.com: Retrieved May 13, 2021, from https://afribary.com/works/a-critical-analysis-of-the-applicability-of-international-humanitarian-law-in-the-context-of-cyber-warfare

MLA 8th

Research, SSA. "A Critical Analysis Of The Applicability Of International Humanitarian Law In The Context Of Cyber Warfare" Afribary.com. Afribary.com, 04 May. 2021, https://afribary.com/works/a-critical-analysis-of-the-applicability-of-international-humanitarian-law-in-the-context-of-cyber-warfare . Accessed 13 May. 2021.

MLA7

Research, SSA. "A Critical Analysis Of The Applicability Of International Humanitarian Law In The Context Of Cyber Warfare". Afribary.com, Afribary.com, 04 May. 2021. Web. 13 May. 2021. < https://afribary.com/works/a-critical-analysis-of-the-applicability-of-international-humanitarian-law-in-the-context-of-cyber-warfare >.

Chicago

Research, SSA. "A Critical Analysis Of The Applicability Of International Humanitarian Law In The Context Of Cyber Warfare" Afribary.com (2021). Accessed May 13, 2021. https://afribary.com/works/a-critical-analysis-of-the-applicability-of-international-humanitarian-law-in-the-context-of-cyber-warfare