A treaty for cyberspace / Rex Hughes.

By: Material type: TextTextPublication details: 2010Subject(s): In: International Affairs Vol 86 No 2, March 2010, pp.523-541 (32)Summary: Computer communication networks are now being seen as one of the settings for conflict in the 21st century. Cyber-warfare may be in its infancy but the speed with which governments are pursuing e-everything opens a vast new field of opportunity for enemy action whether by nation states, non-state groups or individuals. Several countries have already established formal command and control (C2) over military assets in the cyber-domain. This article considers the evolution of cyberspace, some vectors of cyber-attack, leading debates about the application of international law to cyber-warfare, and finally outlines some elements that might be contained in an international cyber treaty.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Copy number Status Date due Barcode
Journal Article Mindef Library & Info Centre Journals INFORMATION WARFARE (Browse shelf(Opens below)) 1 Not for loan 31932-1001

Computer communication networks are now being seen as one of the settings for conflict in the 21st century. Cyber-warfare may be in its infancy but the speed with which governments are pursuing e-everything opens a vast new field of opportunity for enemy action whether by nation states, non-state groups or individuals. Several countries have already established formal command and control (C2) over military assets in the cyber-domain. This article considers the evolution of cyberspace, some vectors of cyber-attack, leading debates about the application of international law to cyber-warfare, and finally outlines some elements that might be contained in an international cyber treaty.

There are no comments on this title.

to post a comment.