메뉴 건너뛰기




Volumn 17, Issue 2, 2012, Pages 187-209

Cyber security without Cyber war

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84865569445     PISSN: 14677954     EISSN: 14677962     Source Type: Journal    
DOI: 10.1093/jcsl/krs017     Document Type: Article
Times cited : (97)

References (114)
  • 1
    • 84865537894 scopus 로고    scopus 로고
    • Note
    • Scholarly articles on the international law of cyberspace began to appear in the mid-1990s. These would, of course, have reflected developments and discussions of the previous years.
  • 2
    • 0007470963 scopus 로고    scopus 로고
    • Lex Informatica: Foundations of Law on the Internet
    • See, eg, A Mefford, 'Lex Informatica: Foundations of Law on the Internet' (1997/1998) 5 Ind J Global Legal Studies 211.
    • (1997) Ind J Global Legal Studies , vol.5 , pp. 211
    • Mefford, A.1
  • 3
    • 0348199156 scopus 로고    scopus 로고
    • Law and Borders-The Rise of Law in Cyberspace
    • DR Johnson and D Post, 'Law and Borders-The Rise of Law in Cyberspace' (1996) 48 Stanford L Rev 1367.
    • (1996) Stanford L Rev , vol.48 , pp. 1367
    • Johnson, D.R.1    Post, D.2
  • 7
    • 84865534811 scopus 로고    scopus 로고
    • Note
    • See s 2.A below and accompanying notes.
  • 8
    • 84865533711 scopus 로고    scopus 로고
    • Note
    • The North Atlantic Treaty Organization was founded in 1949 for the collective self-defence of Western European states, the USA and Canada.
  • 9
    • 84865534813 scopus 로고    scopus 로고
    • (accessed 20 June).
    • See (accessed 20 June 2012).
    • (2012)
  • 11
    • 84865573567 scopus 로고    scopus 로고
    • Note
    • See s 2.B below and accompanying notes.
  • 12
    • 84865537867 scopus 로고    scopus 로고
    • The New Cyber Arms Race
    • (7 March), (accessed 20 June 2012).
    • See, eg, M Clayton, 'The New Cyber Arms Race' Christian Science Monitor (7 March 2011), (accessed 20 June 2012).
    • (2011) Christian Science Monitor
    • Clayton, M.1
  • 13
    • 84865573566 scopus 로고    scopus 로고
    • Note
    • See also ns 51-53 and accompanying text.
  • 14
    • 84865533712 scopus 로고    scopus 로고
    • Note
    • See n 51 and accompanying text.
  • 15
    • 84865537868 scopus 로고    scopus 로고
    • Note
    • See s 2.C and accompanying notes.
  • 16
    • 79953250341 scopus 로고    scopus 로고
    • To Win the Cyber-War, Look to the Cold War
    • (Washington, 28 February) at Bl. (The op-ed's online version has a different title: 'How to Win the Cyber War We Are Losing, (accessed 20 June 2012).)
    • See, eg, M McConnell, 'To Win the Cyber-War, Look to the Cold War' Washington Post (Washington, 28 February 2010) at Bl. (The op-ed's online version has a different title: 'How to Win the Cyber War We Are Losing' (accessed 20 June 2012).)
    • (2010) Washington Post
    • McConnell, M.1
  • 17
    • 84858253955 scopus 로고    scopus 로고
    • Cyber-Attacks and the Use of Force: Back to the Future of Article
    • For a law journal article advocating a return to Cold War thinking about cyber security and international law, Yale J Intl L 421, eg at 425-26.
    • For a law journal article advocating a return to Cold War thinking about cyber security and international law, see M Waxman, 'Cyber-Attacks and the Use of Force: Back to the Future of Article 2(4)' (2011) 36 Yale J Intl L 421, eg at 425-26.
    • (2011) , vol.2 , Issue.4 , pp. 36
    • Waxman, M.1
  • 18
    • 84865560095 scopus 로고    scopus 로고
    • Note
    • See ns 55-59 and accompanying text.
  • 20
    • 84865573596 scopus 로고    scopus 로고
    • Denial of Service, Against Cyberwar with Arcane Rules and Regulations
    • Writing in a recent online edition of the main stream international affairs journal, Foreign Policy, Baker wrote that 'State Department and National Security Council lawyers are implementing an international cyber war strategy that relies on international law "norms" to restrict cyberwar. (30 September), (accessed 20 June 2012).
    • Writing in a recent online edition of the main stream international affairs journal, Foreign Policy, Baker wrote that 'State Department and National Security Council lawyers are implementing an international cyber war strategy that relies on international law "norms" to restrict cyberwar.' S Baker, 'Denial of Service, Against Cyberwar with Arcane Rules and Regulations' Foreign Policy (30 September 2011) (accessed 20 June 2012).
    • (2011) Foreign Policy
    • Baker, S.1
  • 21
    • 0348225147 scopus 로고    scopus 로고
    • Computer Network Attack and the Use of Force in International Law: Thoughts on a Normative Framework
    • Waxman, who takes issue with both Schmitt's attempt to devise criteria that could equate cyber attacks with the armed attack necessary to trigger UN Charter art 51 and Dinstein who is confident that the Internet can be regulated under existing weapons conventions and other rules. Waxman (n 10) fns 156-61 and accompanying text (Schmitt) and fn 64 and accompanying text (Dinstein)
    • See, eg, Waxman, who takes issue with both Schmitt's attempt to devise criteria that could equate cyber attacks with the armed attack necessary to trigger UN Charter art 51 and Dinstein who is confident that the Internet can be regulated under existing weapons conventions and other rules. Waxman (n 10) fns 156-61 and accompanying text (Schmitt) and fn 64 and accompanying text (Dinstein), citing MN Schmitt, 'Computer Network Attack and the Use of Force in International Law: Thoughts on a Normative Framework' (1999) 37 Colum J Transnatl L 885.
    • (1999) Colum J Transnatl L , vol.37 , pp. 885
    • Schmitt, M.N.1
  • 22
    • 84861017078 scopus 로고    scopus 로고
    • Computer Network Attacks and Self-Defense
    • Y Dinstein, 'Computer Network Attacks and Self-Defense' (2002) 76 Intl Law Studies 99.
    • (2002) Intl Law Studies , vol.76 , pp. 99
    • Dinstein, Y.1
  • 23
    • 84865573597 scopus 로고    scopus 로고
    • The very point of Waxman's article, for example, is to return to the advocacy of some scholars during the Cold War for expanded rights to use military force by resort to novel interpretations of the plain terms of the UN Charter and rules of customary international law. (n 10) eg at 431.
    • The very point of Waxman's article, for example, is to return to the advocacy of some scholars during the Cold War for expanded rights to use military force by resort to novel interpretations of the plain terms of the UN Charter and rules of customary international law. See Waxman (n 10) eg at 431.
    • Waxman, M.1
  • 24
    • 84865573570 scopus 로고    scopus 로고
    • The Wrong War: The Insistence on Applying Cold War Metaphors to Cybersecurity is Misplaced and Counterproductive
    • (15 August), (accessed 20 June 2012).
    • P Singer and N Schachtman, 'The Wrong War: The Insistence on Applying Cold War Metaphors to Cybersecurity is Misplaced and Counterproductive' Brookings Institution (15 August 2011) (accessed 20 June 2012).
    • (2011) Brookings Institution
    • Singer, P.1    Schachtman, N.2
  • 26
    • 84865560076 scopus 로고    scopus 로고
    • Note
    • See the 1992 Convention on the Prohibition of the Development, Production, Stockpiling and Use of Chemical Weapons and on their Destruction (opened for signature 13 January 1993, entered into force 29 April 1997) 1974 UNTS 317 5www.opcw.org/chemical-weapons-convention4 (accessed 20 June 2012). As of time of writing, the CWC had 188 state parties and over 70% of the world's chemical weapons stockpile had been destroyed.
  • 28
    • 84865560073 scopus 로고    scopus 로고
    • For a helpful, general discussion of the current issues respecting cyber security, Brookings Institution, 26 October, (accessed 20 June 2012).
    • For a helpful, general discussion of the current issues respecting cyber security, see Brookings Institution, 'The Cybersecurity Agenda: Policy Options and the Path Forward' (26 October 2011) (accessed 20 June 2012).
    • (2011) The Cybersecurity Agenda: Policy Options and the Path Forward
  • 30
    • 84865573575 scopus 로고    scopus 로고
    • The Online Threat, Should We Be Worried About a Cyber War?
    • 1 November
    • SM Hersh, 'The Online Threat, Should We Be Worried About a Cyber War?' New Yorker (1 November 2010) 44.
    • (2010) New Yorker , pp. 44
    • Hersh, S.M.1
  • 31
    • 84865565799 scopus 로고    scopus 로고
    • The Cyber Raiders Hitting Estonia
    • 17 May. (accessed 20 June 2012).
    • 'The Cyber Raiders Hitting Estonia' BBC News (17 May 2007) (accessed 20 June 2012).
    • (2007) BBC News
  • 32
    • 84865537874 scopus 로고    scopus 로고
    • Estonia Fines Man for Cyber War
    • 25 January. (accessed 20 June 2012).
    • 'Estonia Fines Man for Cyber War' BBC News (25 January 2008) (accessed 20 June 2012).
    • (2008) BBC News
  • 33
    • 38649119617 scopus 로고    scopus 로고
    • Digital Fears Emerge After Data Siege in Estonia
    • New York, 29 May, (accessed 20 June 2012).
    • M Landler and J Markoff, 'Digital Fears Emerge After Data Siege in Estonia' New York Times (New York, 29 May 2007) (accessed 20 June 2012).
    • (2007) New York Times
    • Landler, M.1    Markoff, J.2
  • 34
    • 62849125514 scopus 로고    scopus 로고
    • Hackers Take Down the Most Wired Country in Europe
    • (21 August). (accessed 20 June 2012).
    • J Davis, 'Hackers Take Down the Most Wired Country in Europe' Wired Magazine (21 August 2007) (accessed 20 June 2012).
    • (2007) Wired Magazine
    • Davis, J.1
  • 35
    • 84865573574 scopus 로고    scopus 로고
    • Baltic States Urge NATO to Bolster Cyber-Defense
    • 27 May, (accessed 20 June 2012).
    • J Benitz, 'Baltic States Urge NATO to Bolster Cyber-Defense' NATO Alliance (27 May 2011) (accessed 20 June 2012).
    • (2011) NATO Alliance
    • Benitz, J.1
  • 36
    • 84865309180 scopus 로고    scopus 로고
    • Combatant Status and Computer Network Attack
    • For details of the computer network attacks that occurred during the South Ossetia conflict
    • For details of the computer network attacks that occurred during the South Ossetia conflict, see S Watts, 'Combatant Status and Computer Network Attack' (2010) 50 Virginia J Intl L 391, 397-98.
    • (2010) Virginia J Intl L , vol.50
    • Watts, S.1
  • 37
    • 84865533716 scopus 로고    scopus 로고
    • Georgia: Russia "conducting cyber war"
    • London, 11 August, (accessed 20 June 2012).
    • J Swaine, 'Georgia: Russia "conducting cyber war" ' The Telegraph (London, 11 August 2008) (accessed 20 June 2012).
    • (2008) The Telegraph
    • Swaine, J.1
  • 38
    • 84865573573 scopus 로고    scopus 로고
    • Cooperative Cyber Defence Centre of Excellence, accessed 20 June 2012
    • See also E Tikk and others, 'Cyber Attacks Against Georgia: Legal Lessons Identified' (Cooperative Cyber Defence Centre of Excellence 2008) 1, 4-15 at (accessed 20 June 2012).
    • (2008) Cyber Attacks Against Georgia: Legal Lessons Identified , vol.1 , pp. 4-15
    • Tikk, E.1
  • 39
    • 84865537873 scopus 로고    scopus 로고
    • The Prohibition on the Use of Force
    • C Henderson and N White (eds), forthcoming Edward Elgar Publishing
    • See, generally, ME O'Connell, 'The Prohibition on the Use of Force' in C Henderson and N White (eds), The Handbook of Conflict and Security Law (forthcoming Edward Elgar Publishing).
    • The Handbook of Conflict and Security Law
    • O'Connell, M.E.1
  • 42
    • 81055128075 scopus 로고    scopus 로고
    • Israeli Test on Worm Called Crucial in Iran Nuclear Delay
    • New York, 15 January
    • WJ Broad and others, 'Israeli Test on Worm Called Crucial in Iran Nuclear Delay' New York Times (New York, 15 January 2011).
    • (2011) New York Times
    • Broad, W.J.1
  • 43
    • 84860266963 scopus 로고    scopus 로고
    • Stuxnet Work "Targeted high-value Iranian Assets
    • 23 September, (accessed 20 June 2012).
    • J Fildes, 'Stuxnet Work "Targeted high-value Iranian Assets" ', BBC News (23 September 2010) (accessed 20 June 2012).
    • (2010) BBC News
    • Fildes, J.1
  • 44
    • 84865560077 scopus 로고    scopus 로고
    • Computer Virus Used to Sabotage Iran's Nuclear Plan "Built by US and Israel"
    • 27 January
    • J Hilder, 'Computer Virus Used to Sabotage Iran's Nuclear Plan "Built by US and Israel" ' Australian (27 January 2011).
    • (2011) Australian
    • Hilder, J.1
  • 45
    • 84865573582 scopus 로고    scopus 로고
    • NATO, (accessed 20 June).
    • 'NATO and Cyber Defence' NATO (accessed 20 June 2012).
    • (2012) NATO and Cyber Defence
  • 46
    • 84865560078 scopus 로고    scopus 로고
    • NATO Creates Cyber-Defence Command
    • (9 April). (accessed 20 June 2012).
    • N Heath, 'NATO Creates Cyber-Defence Command' ZD Net (9 April 2008) (accessed 20 June 2012).
    • (2008) ZD Net
    • Heath, N.1
  • 50
    • 84865573578 scopus 로고    scopus 로고
    • Research Division NATO Defence College, Working Paper No 62, (accessed 20 June 2012) at 8.
    • J Hunker, 'Cyber War and Cyber Power: Issues for NATO Doctrine' Research Division NATO Defence College, Working Paper No 62, 2010 (accessed 20 June 2012) at 8.
    • (2010) Cyber War and Cyber Power: Issues for NATO Doctrine
    • Hunker, J.1
  • 56
    • 84865573586 scopus 로고    scopus 로고
    • The Rise of the Cybersecurity Industrial Complex
    • (22 April), (accessed 20 June 2012).
    • T Carney, 'The Rise of the Cybersecurity Industrial Complex' The Examiner (22 April 2011) (accessed 20 June 2012).
    • (2011) The Examiner
    • Carney, T.1
  • 57
    • 84865537876 scopus 로고    scopus 로고
    • Senators Introduce Cybersecurity Act of 2012
    • (22 February), (accessed 20 June 2012).
    • Hunton & Williams LLP, 'Senators Introduce Cybersecurity Act of 2012' Association of Corp Counsel (22 February 2012) (accessed 20 June 2012).
    • (2012) Association of Corp Counsel
    • Hunton1    Williams, L.L.P.2
  • 58
    • 84865533720 scopus 로고    scopus 로고
    • McCain Promises GOP Alternative to "Super Regulator" Cybersecurity Bill
    • (20 February), (accessed 20 June 2012).
    • 'McCain Promises GOP Alternative to "Super Regulator" Cybersecurity Bill' The Daily Caller (20 February 2012) (accessed 20 June 2012).
    • (2012) The Daily Caller
  • 62
    • 84865573588 scopus 로고    scopus 로고
    • See Baker (n 13).
    • , Issue.13
    • Baker1
  • 64
    • 84865533721 scopus 로고    scopus 로고
    • Note
    • Numerous examples come readily to mind: the continuing operation of the prison at Guantánamo Bay, Cuba; the continuing use of military commissions; the failure to enforce the Geneva Convention prohibition on torture, the failure to enforce the Convention Against Torture's obligations and the campaign of targeted killing far from zones of armed conflict hostilities, to name a few.
  • 65
    • 84865537880 scopus 로고    scopus 로고
    • Adhering to Law and Values against Terrorism
    • See ME O'Connell, 'Adhering to Law and Values against Terrorism' (2012) Notre Dame J Intl & Comp Law (forthcoming).
    • (2012) Notre Dame J Intl & Comp Law
    • O'Connell, M.E.1
  • 66
    • 84865537884 scopus 로고    scopus 로고
    • (n 14).
    • Schmitt (n 14).
    • Schmitt1
  • 67
    • 85181951166 scopus 로고    scopus 로고
    • World Wide Warfare-Jus Ad Bellum and the Use of Force
    • M Roscini, 'World Wide Warfare-Jus Ad Bellum and the Use of Force' (2010) 14 Max Planck UN YBk 85.
    • (2010) Max Planck UN YBk , vol.14 , pp. 85
    • Roscini, M.1
  • 70
    • 84865537883 scopus 로고    scopus 로고
    • Note
    • UN Charter Art 2(4): 'All Members shall refrain in their international relations from the threat or use of force against the territorial integrity or political independence of any State, or in any other manner inconsistent with the Purposes of the United Nations'. Article 39: 'the Security Council is given authority to 'determine the existence of any threat to the peace, breach of the peace, or act of aggression' and the responsibility to 'maintain or restore international peace'. It may do so by authorizing the use of force by member states'. Article 51: 'Nothing in the present Charter shall impair the inherent right of individual or collective self-defense if an armed attack occurs against a member of the United Nations, until the Security Council has taken measures necessary to maintain international peace and security. Measures taken by members in the exercise of this right of self-defense shall be immediately reported to the Security Council and shall not in any way affect the authority and responsibility of the Security Council under the present Charter to take at any time such action as it deems necessary in order to maintain or restore international peace and security.'
  • 74
    • 27744576434 scopus 로고    scopus 로고
    • Oil Platforms (Iran v US)
    • Oil Platforms (Iran v US) [2003] ICJ Rep 161, 191.
    • (2003) ICJ Rep
  • 75
    • 33847401062 scopus 로고    scopus 로고
    • Legal Consequences of the Construction of a Wall in the Occupied Palestinian Territory (Advisory Opinion)
    • Legal Consequences of the Construction of a Wall in the Occupied Palestinian Territory (Advisory Opinion) [2004] ICJ Rep 136, 195.
    • (2004) ICJ Rep
  • 76
    • 78049352966 scopus 로고    scopus 로고
    • Armed Activities on the Territory of the Congo (Congo v Uganda)
    • Armed Activities on the Territory of the Congo (Congo v Uganda) [2005] ICJ Rep 168, 301.
    • (2005) ICJ Rep
  • 77
    • 33846992645 scopus 로고    scopus 로고
    • Evidence of Terror
    • See generally on the evidence standards of international law in use of force cases
    • See generally on the evidence standards of international law in use of force cases, ME O'Connell, 'Evidence of Terror' (2002) 7 JCSL 19.
    • (2002) JCSL , vol.7 , pp. 19
    • O'Connell, M.E.1
  • 80
    • 26044472171 scopus 로고    scopus 로고
    • Computer Attacks on Critical National Infrastructure: A Use of Force Invoking the Right of Self-Defense
    • citing E Jensen, 'Computer Attacks on Critical National Infrastructure: A Use of Force Invoking the Right of Self-Defense' (2002) 38 Stanford J Intl L 232-35.
    • (2002) Stanford J Intl L , vol.38 , pp. 232-35
    • Jensen, E.1
  • 82
    • 84865560083 scopus 로고    scopus 로고
    • Note
    • See n 36.
  • 83
    • 84865573590 scopus 로고    scopus 로고
    • Nicaragua paras 187-201.
    • Nicaragua paras 187-201.
  • 84
    • 84865560079 scopus 로고
    • Declaration on Principles of International Law Concerning Friendly Relations and Cooperation Among States in Accordance with the Charter of the United Nations, GA Res 2625 (XXV), UN Doc N8028
    • See Declaration on Principles of International Law Concerning Friendly Relations and Cooperation Among States in Accordance with the Charter of the United Nations, GA Res 2625 (XXV), UN Doc N8028 (1970).
    • (1970)
  • 85
    • 84865537881 scopus 로고    scopus 로고
    • 1928 OAS Convention on the Rights and Duties of States in the Event of Civil Strife 134 LNTS 45.
    • 1928 OAS Convention on the Rights and Duties of States in the Event of Civil Strife 134 LNTS 45.
  • 86
    • 84865537882 scopus 로고    scopus 로고
    • Nicaragua para 203 (citing Declaration on the Inadmissibility of Intervention in the Domestic Affairs of States and the Protection of their Independence and Sovereignty, GA Res 2131 (XX), UN Doc A/EES/36/103 (9 December 1981)). The Court also referred to the principle of State sovereignty under article 2(1) of the UN Charter, noting its close connection to the principles of the prohibition on the use of force and of non-intervention.
    • See Nicaragua para 203 (citing Declaration on the Inadmissibility of Intervention in the Domestic Affairs of States and the Protection of their Independence and Sovereignty, GA Res 2131 (XX), UN Doc A/EES/36/103 (9 December 1981)). The Court also referred to the principle of State sovereignty under article 2(1) of the UN Charter, noting its close connection to the principles of the prohibition on the use of force and of non-intervention.
  • 88
    • 84865560081 scopus 로고    scopus 로고
    • Note
    • The definitions of the terms 'countermeasures' and 'sanctions' are not a settled matter in international law. White and Abass, for example, define countermeasures as non-forcible measures taken by States and sanctions as non-forcible measures taken by organizations. This would be a helpful distinction but for the fact that the USA, for example, labels its unilateral, non-forcible coercive measures 'sanctions'.
  • 89
    • 84921548014 scopus 로고    scopus 로고
    • Countermeasures and Sanctions
    • M Evans (ed), 3rd edn, OUP
    • See generally, N White and A Abass, 'Countermeasures and Sanctions' in M Evans (ed), International Law (3rd edn, OUP 2010) 531.
    • (2010) International Law , pp. 531
    • White, N.1    Abass, A.2
  • 90
    • 84865533727 scopus 로고    scopus 로고
    • Note
    • In the USA the leading scholar in the area of the Internet is Lawrence Lessig of Harvard Law School. Lessig does comment on international and foreign law but his background and training are plainly in the area of US domestic law. Even Jack Goldsmith, also Harvard Law School, while being called the future of international law at the school is plainly from the domestic law arena. This is revealed by his comment that law governing military use of the Internet, is uncertain. This fact about cyber scholars is changing, however, as intellectual property scholars, such as Graham Dinwoodie, with strong backgrounds in international and domestic law relevant to cyber space regulation.
  • 91
    • 84865533725 scopus 로고    scopus 로고
    • A number of scholars have already been cited working in the area of international law and the use of force, who have analysed military force in cyber space, (n 14).
    • A number of scholars have already been cited working in the area of international law and the use of force, who have analysed military force in cyber space: see eg, Schmitt (n 14).
    • Schmitt1
  • 92
  • 93
    • 84865533726 scopus 로고    scopus 로고
    • (n 77).
    • Graham (n 77).
    • Graham1
  • 94
    • 84865573592 scopus 로고    scopus 로고
    • (n 12).
    • Dunlap (n 12).
    • Dunlap1
  • 95
    • 84865573591 scopus 로고    scopus 로고
    • Note
    • As White and Abass point out, it is also the case that international law scholars have paid relatively little attention to countermeasures and sanctions and the rules governing their use. White and Abass (n 83) 531.
  • 99
    • 84865533728 scopus 로고    scopus 로고
    • Note
    • See n 18.
  • 100
    • 84865560084 scopus 로고    scopus 로고
    • 1970 Treaty on Nuclear Non-Proliferation (opened for signature 1 July 1968, entered into force 5 March 1970) 729 UNTS 161, (accessed 20 June).
    • 1970 Treaty on Nuclear Non-Proliferation (opened for signature 1 July 1968, entered into force 5 March 1970) 729 UNTS 161 (accessed 20 June 2012).
    • (2012)
  • 101
    • 78751636824 scopus 로고    scopus 로고
    • US and Russia Differ on a Treaty for Cyberspace
    • (New York, 27 June), (accessed 20 June 2012).
    • J Markoff and AE Kramer, 'US and Russia Differ on a Treaty for Cyberspace' New York Times (New York, 27 June 2009) (accessed 20 June 2012).
    • (2009) New York Times
    • Markoff, J.1    Kramer, A.E.2
  • 102
    • 84865573595 scopus 로고    scopus 로고
    • Note
    • Waxman dismisses the Russian proposal because he believes the Russians are developing cyber weapons. This is an unpersuasive reason not to pursue a convention. While the Chemical Weapons Convention was being negotiated, however, States continued to maintain chemical weapons and very likely to continue to develop them. Waxman (n 14). The Russian proposal has been part of the discussion within the United Nations about achieving security in cyberspace. This discussion dates to 1998.
  • 103
    • 84865573593 scopus 로고    scopus 로고
    • See Developments in the field of information and telecommunications in the context of international security, G.A. Res 53/70, U.N.Doc. A/RES/53/70 (4 January).
    • See Developments in the field of information and telecommunications in the context of international security, G.A. Res 53/70, U.N.Doc. A/RES/53/70 (4 January 1999).
    • (1999)
  • 105
    • 84865533731 scopus 로고    scopus 로고
    • 2001 Budapest Convention on Cybercrime, (accessed 20 June).
    • 2001 Budapest Convention on Cybercrime (accessed 20 June 2012).
    • (2012)
  • 106
    • 84897784681 scopus 로고    scopus 로고
    • Travelling Light in a Time of Digital Thievery
    • (New York, 10 February), (accessed 20 June 2012).
    • N Perlroth, 'Travelling Light in a Time of Digital Thievery' New York Times (New York, 10 February 2012) (accessed 20 June 2012).
    • (2012) New York Times
    • Perlroth, N.1
  • 107
    • 84865573599 scopus 로고    scopus 로고
    • Cyber Strategies Revealed
    • (11 December), (accessed 20 June 2012).
    • M Borrett, 'Cyber Strategies Revealed' IBM Institute for Advanced Security (11 December 2011) (accessed 20 June 2012).
    • (2011) IBM Institute for Advanced Security
    • Borrett, M.1
  • 108
    • 84865533732 scopus 로고    scopus 로고
    • Cyber Security: Protecting the Public Sector
    • (September), (accessed 20 June 2012) 1, 7.
    • C Nott and others, 'Cyber Security: Protecting the Public Sector' IBM Institute for Advanced Security (September 2011) (accessed 20 June 2012) 1, 7.
    • (2011) IBM Institute for Advanced Security
    • Nott, C.1
  • 109
    • 84865573600 scopus 로고    scopus 로고
    • Cyber Command Synchronizes Services' Efforts
    • (9 July), (accessed 20 June 2012) (emphasis added).
    • L Daniel, 'Cyber Command Synchronizes Services' Efforts' US Department of Defense (9 July 2010) (accessed 20 June 2012) (emphasis added).
    • (2010) US Department of Defense
    • Daniel, L.1
  • 110
    • 84865560089 scopus 로고    scopus 로고
    • Note
    • 'Much of cyberspace is owned and used by private companies. [Thus i]t is businesses that will drive the innovation required to keep pace with security challenges.' Borrett (n 96).
  • 111
    • 84865533733 scopus 로고    scopus 로고
    • Private Sector Neglects Cyber Security
    • (29 November), (accessed 20 June 2012).
    • A Etzioni, 'Private Sector Neglects Cyber Security' The National Interest (29 November 2011) (accessed 20 June 2012).
    • (2011) The National Interest
    • Etzioni, A.1
  • 112
    • 84865537886 scopus 로고    scopus 로고
    • The 2012 World Conference on International Telecommunications: Another Brewing Storm Over Potential Un Regulation of the Internet
    • The attitude of many in the private commercial cyber sector is captured in this opening sentence of an on-line article by two lawyers on behalf, presumably, of clients: 'Once again, many companies in the telecoms and information and communications technology (ICT) sector are facing the specter of a United Nations agency (in this case the International Telecommunications Union (ITU)) regulating critically important aspects of the internet as well as substantially expanding its jurisdiction over the telecoms and ICT industries, (30 April), (accessed 20 June 2012).
    • The attitude of many in the private commercial cyber sector is captured in this opening sentence of an on-line article by two lawyers on behalf, presumably, of clients: 'Once again, many companies in the telecoms and information and communications technology (ICT) sector are facing the specter of a United Nations agency (in this case the International Telecommunications Union (ITU)) regulating critically important aspects of the internet as well as substantially expanding its jurisdiction over the telecoms and ICT industries.' Ambassador DA Gross and E Lucarelli, 'The 2012 World Conference on International Telecommunications: Another Brewing Storm Over Potential Un Regulation of the Internet' Who'sWho Legal (30 April 2012) (accessed 20 June 2012).
    • (2012) Who'sWho Legal
    • Ambassador, D.A.1    Lucarelli, E.2
  • 113
    • 84865560094 scopus 로고    scopus 로고
    • Note
    • The Brookings Institution (n 16). 'Being secure is not just about keeping 'bad guys on the outside; it's about making the systems inside less vulnerable.' Reducing vulnerability of internal systems includes ensuring: (1) Each application validates its input for reasonability before processing; and (2) Each application has a way of announcing an exception-whether it is a security intrusion or simply a failing intelligent Electronic Device (IED) sending bad input. It is for the security system to decide why the abnormal event occurred.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.