| 
  • If you are citizen of an European Union member nation, you may not use this service unless you are at least 16 years old.

  • You already know Dokkio is an AI-powered assistant to organize & manage your digital files & messages. Very soon, Dokkio will support Outlook as well as One Drive. Check it out today!

View
 

The Ethics of Cyber Conflict

Page history last edited by Riela Isabel Antonio 15 years, 1 month ago

 

Chapter: The Ethics of Cyber Conflict

Quote:

There are several areas of cyber conflict that the paper does not address. Besides cyber attacks conducted for pleasure or personal gain, the paper does not consider revenge attacks by insiders—all of which are generally regarded as unethical. In addition, the paper does not address methods of cyber conflict other than cyber attacks, for example, messages transmitted for the purpose of psychological operations or deception. Although other types of activity raise important ethical issues, their treatment is beyond the scope of this paper.

What I expect to learn:

To know more about the ethics of cyber conflict and what the conflicts are

Review:                    

With the advancing technology, even internet can cause war to countries. It could be a silent war; no one would get hurt… physically. Cyber conflict may result to chaos to the concerned parties. Such as what happened in September 2000, wherein Israelite teenage hackers created a website that successfully jammed six websites in Lebanon, causing a huge turmoil in different websites in Israel, including those of the Palestinians and at least one U.S. site. They made two main types of attacks, the website defacement and distributed denial of service. Website defacement focuses on high-profile political site such as government sites. Disruption of such site would cause confusion to the citizens of that country and those other persons that are connected to them. On the other hand, DDoS or distributed denial of service concerns shutting down of opposing sites. The Israelites teenage hackers also assaulted the websites that concerns broadcasting, telecommunication infrastructures and other websites corning alike. One website that the hacker attacked was the internet service provider that deals with Israeli senior citizens.

What I learned:

·         CYBER WARFARE AT THE STATE LEVEL

·         Jus ad Bellum—The Law of Conflict Management

·         When Does a Cyber Attack Constitute the Use of Force

·         Jus in Bello—The Law of War

o    Distinction of Combatants from Noncombatants.

o    Military Necessity.

o    Proportionality.

o    Indiscriminate Weapons.

o    Superfluous Injury.

o    Perfidy.

o    Neutrality.

·         CYBER ATTACKS BY NONSTATE ACTORS

·         Just Cause for Hacktivism

·         Conduct of Hacktivism

·         Other Ethical Frameworks for Hacktivism

·         The Doctrine of Self-Defense

·         Hack Back and Force

Integrative Questions:            

1.    What is cyber conflict?

2.    Give at least two cyber conflicts mentioned in this chapter.

3.    What is Jus in Bello?

4.    What is Jus ad Bellum?

5.    What are the ethical frameworks of Hacktivism?

Comments (0)

You don't have permission to comment on this page.