首页 > 最新文献

The Oxford Handbook of Cyber Security最新文献

英文 中文
Global Trade and Cybersecurity 全球贸易与网络安全
Pub Date : 2021-11-04 DOI: 10.1093/oxfordhb/9780198800682.013.32
Franz-Stefan Gady, Greg Austin
Trade in information and communications technologies (ICTs) is a new currency of international power. On the one hand, this commerce boosts national prosperity and the global economy. On the other hand, it puts capabilities for harm into the hands of potential malicious actors or political adversaries. States are scrambling to introduce new security control mechanisms through a variety of laws, regulations, and policies. These practices will have mixed results, not least because some of the more threatening elements of the trade relate to software products and even the results of basic scientific research that cannot be tracked as easily as physical goods. Enforcement of trade restrictions in this area will remain problematic. Even so, states are looking to undertake economic sanctions in this area to retaliate for the malicious behaviour in cyberspace of other states (or of criminals operating with impunity from the territory of other states). The corporate sector has emerged as an independent actor in these interstate controversies, and they have been joined by scientists and civil society activists, all pressing for a more liberal and open approach. While the unilateralist trend seems to have the upper hand for now, common interests and the imperatives of trade may force new collaborative behaviours among states.
信息和通信技术(ict)贸易是一种新的国际权力货币。一方面,这种贸易促进了国家繁荣和全球经济。另一方面,它将造成伤害的能力交到潜在的恶意行为者或政治对手手中。各国正争先恐后地通过各种法律、法规和政策引入新的安全控制机制。这些做法将产生好坏参半的结果,尤其是因为贸易中一些更具威胁性的因素与软件产品有关,甚至与基础科学研究的结果有关,这些结果不像实物产品那样容易追踪。在这一领域执行贸易限制仍有问题。即便如此,各国仍在寻求在这一领域实施经济制裁,以报复其他国家(或在其他国家领土上逍遥法外的犯罪分子)在网络空间的恶意行为。在这些州际争议中,企业部门已经成为一个独立的参与者,科学家和民间社会活动家也加入了他们的行列,他们都迫切要求采取更自由、更开放的方式。虽然单边主义趋势目前似乎占了上风,但共同利益和贸易的必要性可能会迫使国家之间采取新的合作行为。
{"title":"Global Trade and Cybersecurity","authors":"Franz-Stefan Gady, Greg Austin","doi":"10.1093/oxfordhb/9780198800682.013.32","DOIUrl":"https://doi.org/10.1093/oxfordhb/9780198800682.013.32","url":null,"abstract":"Trade in information and communications technologies (ICTs) is a new currency of international power. On the one hand, this commerce boosts national prosperity and the global economy. On the other hand, it puts capabilities for harm into the hands of potential malicious actors or political adversaries. States are scrambling to introduce new security control mechanisms through a variety of laws, regulations, and policies. These practices will have mixed results, not least because some of the more threatening elements of the trade relate to software products and even the results of basic scientific research that cannot be tracked as easily as physical goods. Enforcement of trade restrictions in this area will remain problematic. Even so, states are looking to undertake economic sanctions in this area to retaliate for the malicious behaviour in cyberspace of other states (or of criminals operating with impunity from the territory of other states). The corporate sector has emerged as an independent actor in these interstate controversies, and they have been joined by scientists and civil society activists, all pressing for a more liberal and open approach. While the unilateralist trend seems to have the upper hand for now, common interests and the imperatives of trade may force new collaborative behaviours among states.","PeriodicalId":336846,"journal":{"name":"The Oxford Handbook of Cyber Security","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121261340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cybersecurity Information Sharing 网络安全信息共享
Pub Date : 2021-11-04 DOI: 10.1093/oxfordhb/9780198800682.013.55
Stuart Murdoch
This chapter considers the impact on cyber security of a shift from voluntary coordination to mandatory incident reporting. It traces the efforts to organize collaboration for cyber security incident response back to its voluntary beginnings with the establishment of CERT/CC by DARPA in response to the Morris Worm in 1988, via the establishment of ISACs then ISAOs under successive US presidents, to the CiSP in the UK following the London 2012 Olympics. Recognizing efforts to standardize and automate information sharing, the discussion touches on how information sharing has come to form the basis of national cyber strategies, forming a foundational element of internationally recognized maturity models for those strategies, and it goes on to consider the increasing move towards more mandatory incident reporting, especially in Critical National Infrastructure sectors across the globe, from the Defence Industrial Base in the United States to the NISD throughout the European Union. It considers the impact of mandating reporting on levels of collaboration overall, concluding that regulators must be careful not to create sector-specific silos or undermine existing levels of voluntary sharing through their enforcement of such mandatory schemes.
本章考虑从自愿协调到强制性事件报告的转变对网络安全的影响。它将组织网络安全事件响应合作的努力追溯到DARPA在1988年莫里斯蠕虫事件后自愿建立的CERT/CC,通过在历届美国总统领导下建立isac和ISAOs,到2012年伦敦奥运会后在英国建立的CiSP。认识到信息共享标准化和自动化的努力,讨论涉及信息共享如何形成国家网络战略的基础,形成国际公认的成熟度模型的基本要素,并继续考虑越来越多的强制性事件报告,特别是在全球关键的国家基础设施部门。从美国的国防工业基地到整个欧盟的NISD。它考虑了强制报告对整体合作水平的影响,得出的结论是,监管机构必须小心,不要通过执行此类强制性计划来创建特定行业的孤岛或破坏现有的自愿共享水平。
{"title":"Cybersecurity Information Sharing","authors":"Stuart Murdoch","doi":"10.1093/oxfordhb/9780198800682.013.55","DOIUrl":"https://doi.org/10.1093/oxfordhb/9780198800682.013.55","url":null,"abstract":"This chapter considers the impact on cyber security of a shift from voluntary coordination to mandatory incident reporting. It traces the efforts to organize collaboration for cyber security incident response back to its voluntary beginnings with the establishment of CERT/CC by DARPA in response to the Morris Worm in 1988, via the establishment of ISACs then ISAOs under successive US presidents, to the CiSP in the UK following the London 2012 Olympics. Recognizing efforts to standardize and automate information sharing, the discussion touches on how information sharing has come to form the basis of national cyber strategies, forming a foundational element of internationally recognized maturity models for those strategies, and it goes on to consider the increasing move towards more mandatory incident reporting, especially in Critical National Infrastructure sectors across the globe, from the Defence Industrial Base in the United States to the NISD throughout the European Union. It considers the impact of mandating reporting on levels of collaboration overall, concluding that regulators must be careful not to create sector-specific silos or undermine existing levels of voluntary sharing through their enforcement of such mandatory schemes.","PeriodicalId":336846,"journal":{"name":"The Oxford Handbook of Cyber Security","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130465876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The Deterrence and Prevention of Cyber Conflict 网络冲突的威慑和预防
Pub Date : 2021-11-04 DOI: 10.1093/oxfordhb/9780198800682.013.16
P. Cornish
For all its apparent complexity, deterrence is built upon a relatively straightforward premise: that fear of adverse consequences can serve to prevent unacceptable behaviour. In traditional deterrence theory, particularly that which matured during the Cold War, prevention could be achieved both by fear of punishment and by fear of failure: by punitive measures that would be undertaken in response to a transgression and intended to inflict some pain, damage, or loss upon the transgressor; or by a denial posture intended to impress upon an adversary that the complexities of the defences will be technologically insurmountable and/or the costs of doing so unbearably high. Fresh thinking is required to make deterrence relevant to the cyber era. The challenges of cyber warfare are described here as the ‘four zeros’: ‘zero day’ vulnerability to novel malware; ‘zero source’ or non-attribution of an attack; ‘zero effect’ or covert, non-detectable attack; and ‘zero intent’ or lack of clarity as to an adversary’s intentions. These challenges can be met by allowing deterrence to function in different ways as circumstances allow or require: punitive, constructive, and protective deterrence.
尽管威慑看起来很复杂,但它建立在一个相对简单的前提之上:对不利后果的恐惧可以防止不可接受的行为。在传统的威慑理论中,特别是在冷战期间成熟的威慑理论中,预防可以通过害怕惩罚和害怕失败来实现:通过对违法行为作出反应而采取的惩罚性措施,旨在对违法者造成一些痛苦、损害或损失;或者采取一种拒绝的姿态,目的是让对手意识到,防御的复杂性在技术上是无法克服的,或者这样做的成本高得令人难以忍受。网络时代的威慑力需要新的思维。网络战的挑战在这里被描述为“四个零”:“零日”漏洞对新型恶意软件;“零源”或不归因攻击;“零效应”或隐蔽的、无法察觉的攻击;“零意图”或对对手的意图缺乏明确。这些挑战可以通过允许威慑在环境允许或需要的情况下以不同的方式发挥作用来应对:惩罚性威慑、建设性威慑和保护性威慑。
{"title":"The Deterrence and Prevention of Cyber Conflict","authors":"P. Cornish","doi":"10.1093/oxfordhb/9780198800682.013.16","DOIUrl":"https://doi.org/10.1093/oxfordhb/9780198800682.013.16","url":null,"abstract":"For all its apparent complexity, deterrence is built upon a relatively straightforward premise: that fear of adverse consequences can serve to prevent unacceptable behaviour. In traditional deterrence theory, particularly that which matured during the Cold War, prevention could be achieved both by fear of punishment and by fear of failure: by punitive measures that would be undertaken in response to a transgression and intended to inflict some pain, damage, or loss upon the transgressor; or by a denial posture intended to impress upon an adversary that the complexities of the defences will be technologically insurmountable and/or the costs of doing so unbearably high. Fresh thinking is required to make deterrence relevant to the cyber era. The challenges of cyber warfare are described here as the ‘four zeros’: ‘zero day’ vulnerability to novel malware; ‘zero source’ or non-attribution of an attack; ‘zero effect’ or covert, non-detectable attack; and ‘zero intent’ or lack of clarity as to an adversary’s intentions. These challenges can be met by allowing deterrence to function in different ways as circumstances allow or require: punitive, constructive, and protective deterrence.","PeriodicalId":336846,"journal":{"name":"The Oxford Handbook of Cyber Security","volume":"161 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125902738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cybercrime: Thieves, Swindlers, Bandits, and Privateers in Cyberspace 网络犯罪:网络空间中的小偷、骗子、强盗和私掠者
Pub Date : 2021-11-04 DOI: 10.1093/oxfordhb/9780198800682.013.5
R. Broadhurst
This chapter describes the definitions and scope of cybercrime including an outline of the history of hackers and the role of criminal networks and markets in the dissemination of malicious software and other contraband such as illicit drugs, stolen credit cards and personal identification, firearms, and criminal services. Different cybercrime types and methods are described, including the widespread use of ‘social engineering’ or deception in computer misuse and identity theft. The challenges facing law enforcement in the suppression of cybercrime and the important role of private and public partnerships, as well as cross-national cooperation in the suppression of cybercrime is illustrated.
本章描述了网络犯罪的定义和范围,包括黑客的历史概述,以及犯罪网络和市场在传播恶意软件和其他违禁品(如非法毒品、被盗信用卡和个人身份证件、枪支和犯罪服务)方面的作用。书中描述了不同的网络犯罪类型和方法,包括广泛使用的“社会工程”或在计算机滥用和身份盗窃中的欺骗。报告说明了执法部门在打击网络犯罪方面面临的挑战,以及私营和公共伙伴关系以及跨国合作在打击网络犯罪方面的重要作用。
{"title":"Cybercrime: Thieves, Swindlers, Bandits, and Privateers in Cyberspace","authors":"R. Broadhurst","doi":"10.1093/oxfordhb/9780198800682.013.5","DOIUrl":"https://doi.org/10.1093/oxfordhb/9780198800682.013.5","url":null,"abstract":"This chapter describes the definitions and scope of cybercrime including an outline of the history of hackers and the role of criminal networks and markets in the dissemination of malicious software and other contraband such as illicit drugs, stolen credit cards and personal identification, firearms, and criminal services. Different cybercrime types and methods are described, including the widespread use of ‘social engineering’ or deception in computer misuse and identity theft. The challenges facing law enforcement in the suppression of cybercrime and the important role of private and public partnerships, as well as cross-national cooperation in the suppression of cybercrime is illustrated.","PeriodicalId":336846,"journal":{"name":"The Oxford Handbook of Cyber Security","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130988302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Russian Federation’s Approach to Cybersecurity 俄罗斯联邦对网络安全的态度
Pub Date : 2021-11-04 DOI: 10.1093/oxfordhb/9780198800682.013.44
Anton Shingarev, Anastasiya Kazakova
This chapter discusses the approach of the Russian Federation in the use of information and communication technologies (ICTs) in the context of international security and peace. After analysing the conceptual framework and definitions, as well as key distinguishing features in Russia’s approach, it gives an overview of Russia’s regulatory landscape and main legislative acts concerning cybersecurity and international security broadly. It also provides an analysis of Russian foreign policy on cybersecurity.
本章讨论了俄罗斯联邦在国际安全与和平背景下使用信息通信技术(ict)的做法。在分析了概念框架和定义,以及俄罗斯方法的主要特点之后,本文概述了俄罗斯在网络安全和国际安全方面的监管格局和主要立法行为。它还提供了对俄罗斯网络安全外交政策的分析。
{"title":"The Russian Federation’s Approach to Cybersecurity","authors":"Anton Shingarev, Anastasiya Kazakova","doi":"10.1093/oxfordhb/9780198800682.013.44","DOIUrl":"https://doi.org/10.1093/oxfordhb/9780198800682.013.44","url":null,"abstract":"This chapter discusses the approach of the Russian Federation in the use of information and communication technologies (ICTs) in the context of international security and peace. After analysing the conceptual framework and definitions, as well as key distinguishing features in Russia’s approach, it gives an overview of Russia’s regulatory landscape and main legislative acts concerning cybersecurity and international security broadly. It also provides an analysis of Russian foreign policy on cybersecurity.","PeriodicalId":336846,"journal":{"name":"The Oxford Handbook of Cyber Security","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128098292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Conclusion 结论
Pub Date : 2021-11-04 DOI: 10.1093/oxfordhb/9780198800682.013.51
P. Cornish
Cyberspace offers immense benefits and opportunities as well as considerable threats and hazards. It is routinely exploited by a variety of adversaries, aggressors, and predators: hostile states; political extremists and terrorists; businesses practising commercial espionage and theft; individuals and criminal organizations undertaking financial fraud and trafficking in people, armaments, and narcotics; and individual so-called ‘nuisance’ hackers. The efficient and effective response to these threats and hazards is what cybersecurity is all about. The idea that cybersecurity could also have a larger, more comprehensive, and progressive goal might seem to some to be fanciful: an unrealistic and other-worldly response to the very real possibility of encountering substantial harm in and from cyberspace. Yet, the threat/response dynamic, compelling though it is, is surely not all there is to say about cybersecurity: it should be possible for cybersecurity to have a larger goal than the endless pursuit of (defensive) advantage over an adversary. If cyberspace can be valued as much as feared, then the broader purpose of cybersecurity could be not only to disable threats as they arise but also to enable the positive opportunities offered by the information revolution. Cybersecurity must also address the ordering (i.e. safety, security, and governance) of nothing less than a global digital ecosystem that is taking shape rapidly and beneficially, at every level and in every field of human activity. It is both possible and necessary to combine both perspectives—protection from and progress towards—in one account, as this Handbook of Cybersecurity has shown.
网络空间带来了巨大的利益和机遇,也带来了相当大的威胁和危害。它经常被各种各样的对手、侵略者和掠夺者利用:敌对国家;政治极端分子和恐怖分子;从事商业间谍、商业盗窃活动的;从事金融欺诈和贩运人口、武器和毒品的个人和犯罪组织;以及个别所谓的“讨厌”黑客。对这些威胁和危害的高效和有效的响应是网络安全的全部内容。网络安全也可以有一个更大、更全面、更进步的目标的想法,在一些人看来可能是异想天开:这是对在网络空间中遭受重大伤害的现实可能性的一种不切实际的、超凡脱俗的反应。然而,威胁/响应动态虽然引人注目,但肯定不是网络安全的全部内容:网络安全应该有一个更大的目标,而不是无休止地追求对手的(防御)优势。如果网络空间的价值能与恐惧一样大,那么网络安全的更广泛目的可能不仅是在威胁出现时消除威胁,而且还能使信息革命提供的积极机会成为可能。网络安全还必须解决全球数字生态系统的秩序问题(即安全、保障和治理),这个生态系统正在人类活动的各个层面和各个领域迅速形成,并从中受益。正如本《网络安全手册》所展示的那样,将保护和进步这两种观点结合在一起是可能的,也是必要的。
{"title":"Conclusion","authors":"P. Cornish","doi":"10.1093/oxfordhb/9780198800682.013.51","DOIUrl":"https://doi.org/10.1093/oxfordhb/9780198800682.013.51","url":null,"abstract":"Cyberspace offers immense benefits and opportunities as well as considerable threats and hazards. It is routinely exploited by a variety of adversaries, aggressors, and predators: hostile states; political extremists and terrorists; businesses practising commercial espionage and theft; individuals and criminal organizations undertaking financial fraud and trafficking in people, armaments, and narcotics; and individual so-called ‘nuisance’ hackers. The efficient and effective response to these threats and hazards is what cybersecurity is all about. The idea that cybersecurity could also have a larger, more comprehensive, and progressive goal might seem to some to be fanciful: an unrealistic and other-worldly response to the very real possibility of encountering substantial harm in and from cyberspace. Yet, the threat/response dynamic, compelling though it is, is surely not all there is to say about cybersecurity: it should be possible for cybersecurity to have a larger goal than the endless pursuit of (defensive) advantage over an adversary. If cyberspace can be valued as much as feared, then the broader purpose of cybersecurity could be not only to disable threats as they arise but also to enable the positive opportunities offered by the information revolution. Cybersecurity must also address the ordering (i.e. safety, security, and governance) of nothing less than a global digital ecosystem that is taking shape rapidly and beneficially, at every level and in every field of human activity. It is both possible and necessary to combine both perspectives—protection from and progress towards—in one account, as this Handbook of Cybersecurity has shown.","PeriodicalId":336846,"journal":{"name":"The Oxford Handbook of Cyber Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125309984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cybersecurity, Human Rights, and Empiricism 网络安全、人权和经验主义
Pub Date : 2021-11-04 DOI: 10.1093/oxfordhb/9780198800682.013.56
J. Penney
This chapter examines recent research on the impact of surveillance, both mass and targeted forms, and considers these insights and their implications for cybersecurity. State surveillance has been central to the ‘securitization’ in cybersecurity, particularly the increasing sophistication and expansion of digital surveillance. The chapter looks at different theoretical and empirical approaches to understanding the impact of such surveillance activities, particularly surveillance studies and chilling effects theory. It also considers how new research shows that surveillance has an impact on a range of fundamental human rights and freedoms, with important implications for civil society and deliberative democracy. Awareness of surveillance, or the threat of it, can have a substantial chilling effect on people’s exercise of these rights, leading them to self-censor or avoid seeking or imparting certain sensitive information. Surveillance can also be said to violate international rights against discrimination and protections for minorities, in that it has unequal or disproportionate impact on certain groups, including vulnerable minorities. The chapter then argues for new frameworks for cybersecurity centred on civil society or human rights.
本章考察了最近关于监控影响的研究,包括大规模和有针对性的形式,并考虑了这些见解及其对网络安全的影响。国家监控一直是网络安全“证券化”的核心,尤其是数字监控的日益复杂和扩展。本章着眼于不同的理论和经验方法来理解此类监视活动的影响,特别是监视研究和寒蝉效应理论。它还考虑了新的研究如何表明监视对一系列基本人权和自由产生影响,对公民社会和协商民主具有重要影响。意识到监视或监视的威胁会对人们行使这些权利产生实质性的寒蝉效应,导致他们自我审查或避免寻求或传递某些敏感信息。监视也可以说违反了反对歧视和保护少数群体的国际权利,因为它对某些群体,包括脆弱的少数群体产生了不平等或不成比例的影响。然后,本章主张建立以公民社会或人权为中心的网络安全新框架。
{"title":"Cybersecurity, Human Rights, and Empiricism","authors":"J. Penney","doi":"10.1093/oxfordhb/9780198800682.013.56","DOIUrl":"https://doi.org/10.1093/oxfordhb/9780198800682.013.56","url":null,"abstract":"This chapter examines recent research on the impact of surveillance, both mass and targeted forms, and considers these insights and their implications for cybersecurity. State surveillance has been central to the ‘securitization’ in cybersecurity, particularly the increasing sophistication and expansion of digital surveillance. The chapter looks at different theoretical and empirical approaches to understanding the impact of such surveillance activities, particularly surveillance studies and chilling effects theory. It also considers how new research shows that surveillance has an impact on a range of fundamental human rights and freedoms, with important implications for civil society and deliberative democracy. Awareness of surveillance, or the threat of it, can have a substantial chilling effect on people’s exercise of these rights, leading them to self-censor or avoid seeking or imparting certain sensitive information. Surveillance can also be said to violate international rights against discrimination and protections for minorities, in that it has unequal or disproportionate impact on certain groups, including vulnerable minorities. The chapter then argues for new frameworks for cybersecurity centred on civil society or human rights.","PeriodicalId":336846,"journal":{"name":"The Oxford Handbook of Cyber Security","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131782736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
International Law for Cyberspace 网络空间国际法
Pub Date : 2021-11-04 DOI: 10.1093/oxfordhb/9780198800682.013.37
T. Wingfield, Harry Wingo
This chapter describes the role of international law in cyberspace and in addressing the legality of cyber-related actions taken by countries, companies, associations, and citizens on the world stage. Cyberspace has been described as a new ‘domain’ that is radically different from the land and sea upon which international law developed, but such law either covers or is evolving to cover issues that have been under development for hundreds of years. Such coverage includes the international law principles of sovereignty, due diligence, jurisdiction, and state responsibility. International law also covers numerous specialized regimes: human rights, diplomatic and consular law, law of the sea, air law, space law, and international telecommunications law. Another developing area of international law and cyberspace concerns international peace and security with respect to cyber activities, but those issues lead right up to the threshold of conflict. The once theoretical and purely academic literature of cybercrime, cyber espionage, and, especially, cyberwar must now be applied to real-world cases, and law and policy for the future of cybersecurity must be formulated with an understanding of these broadly accepted international norms.
本章描述了国际法在网络空间中的作用,以及在解决国家、公司、协会和公民在世界舞台上采取的与网络有关的行动的合法性方面的作用。网络空间被描述为一个新的“领域”,它与国际法赖以发展的陆地和海洋截然不同,但这种法律要么涵盖,要么正在演变,以涵盖已经发展了数百年的问题。这些内容包括主权、尽职调查、管辖权和国家责任等国际法原则。国际法还包括许多专门的制度:人权、外交和领事法、海洋法、航空法、空间法和国际电信法。国际法和网络空间的另一个发展领域涉及网络活动方面的国际和平与安全,但这些问题直接导致冲突。曾经关于网络犯罪、网络间谍,尤其是网络战争的理论和纯学术文献,现在必须应用于现实世界的案例,未来网络安全的法律和政策必须在理解这些被广泛接受的国际规范的基础上制定。
{"title":"International Law for Cyberspace","authors":"T. Wingfield, Harry Wingo","doi":"10.1093/oxfordhb/9780198800682.013.37","DOIUrl":"https://doi.org/10.1093/oxfordhb/9780198800682.013.37","url":null,"abstract":"This chapter describes the role of international law in cyberspace and in addressing the legality of cyber-related actions taken by countries, companies, associations, and citizens on the world stage. Cyberspace has been described as a new ‘domain’ that is radically different from the land and sea upon which international law developed, but such law either covers or is evolving to cover issues that have been under development for hundreds of years. Such coverage includes the international law principles of sovereignty, due diligence, jurisdiction, and state responsibility. International law also covers numerous specialized regimes: human rights, diplomatic and consular law, law of the sea, air law, space law, and international telecommunications law. Another developing area of international law and cyberspace concerns international peace and security with respect to cyber activities, but those issues lead right up to the threshold of conflict. The once theoretical and purely academic literature of cybercrime, cyber espionage, and, especially, cyberwar must now be applied to real-world cases, and law and policy for the future of cybersecurity must be formulated with an understanding of these broadly accepted international norms.","PeriodicalId":336846,"journal":{"name":"The Oxford Handbook of Cyber Security","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115594073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Political History of Cyberspace 网络空间政治史
Pub Date : 2021-11-04 DOI: 10.1093/oxfordhb/9780198800682.013.3
Madeline Carr
The political history of cyberspace can reveal much about contemporary and future cyber security challenges. This chapter includes some technological history but, more importantly, it also addresses the political forces and trends that fundamentally shaped the development of cyberspace. In doing so, it provides insight into why cyber security is much more than a technical challenge, and why politics can be simultaneously an obstruction to better global cyber security and also the best hope for it. Observing how political perceptions of cyber security threats have both changed and remained constant over time helps put current approaches into perspective, avoiding the two reductionist arguments that either ‘everything is different now’ or ‘it is the same as it ever was’. Addressing future challenges like the Internet of Things and future remedies like emergent cyber norms require a sound understanding of the past. Essentially, this chapter calls for much more careful and comprehensive engagement with the interrelationship between technological developments and political forces.
网络空间的政治史可以揭示当代和未来的网络安全挑战。这一章包括一些技术历史,但更重要的是,它也讨论了从根本上塑造网络空间发展的政治力量和趋势。在此过程中,它提供了洞察为什么网络安全不仅仅是一个技术挑战,以及为什么政治可以同时成为更好的全球网络安全的障碍,也是最好的希望。观察对网络安全威胁的政治看法是如何随着时间的推移而改变和保持不变的,有助于正确看待当前的方法,避免两种简化论者的论点,即要么“现在一切都不同了”,要么“它和以前一样”。应对未来的挑战,如物联网和未来的补救措施,如新兴的网络规范,需要对过去有充分的了解。从本质上讲,本章要求对技术发展和政治力量之间的相互关系进行更仔细和全面的研究。
{"title":"A Political History of Cyberspace","authors":"Madeline Carr","doi":"10.1093/oxfordhb/9780198800682.013.3","DOIUrl":"https://doi.org/10.1093/oxfordhb/9780198800682.013.3","url":null,"abstract":"The political history of cyberspace can reveal much about contemporary and future cyber security challenges. This chapter includes some technological history but, more importantly, it also addresses the political forces and trends that fundamentally shaped the development of cyberspace. In doing so, it provides insight into why cyber security is much more than a technical challenge, and why politics can be simultaneously an obstruction to better global cyber security and also the best hope for it. Observing how political perceptions of cyber security threats have both changed and remained constant over time helps put current approaches into perspective, avoiding the two reductionist arguments that either ‘everything is different now’ or ‘it is the same as it ever was’. Addressing future challenges like the Internet of Things and future remedies like emergent cyber norms require a sound understanding of the past. Essentially, this chapter calls for much more careful and comprehensive engagement with the interrelationship between technological developments and political forces.","PeriodicalId":336846,"journal":{"name":"The Oxford Handbook of Cyber Security","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121207556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Opportunity, Threat, and Dependency in the Social Infosphere 社会信息圈中的机会、威胁和依赖
Pub Date : 2021-11-04 DOI: 10.1093/oxfordhb/9780198800682.013.2
Greg Austin
The technological revolution outlined in the previous chapter has unleashed a social upheaval. If a suite of machines came to be so central in global and national social order, as well as in our personal lives, how does that affect our security? Bearing in mind that we are only at the dawn of the cyber age, what will the future hold? This chapter gives an overview of the profound impact of the information revolution on human welfare for better and for worse, from the individual and community levels to the national and international levels. The chapter begins with some insight into how philosophers have viewed these questions. It then looks at how leading actors have responded to the opportunities and threats. The chapter’s most important single theme is the issue of dependency, arguably the most ignored security aspect of the information age.
前一章概述的技术革命引发了一场社会剧变。如果一套机器在全球和国家的社会秩序以及我们的个人生活中变得如此重要,这对我们的安全有何影响?请记住,我们只是在网络时代的黎明,未来会是什么样子?本章概述了信息革命对人类福利的深刻影响,无论是好是坏,从个人和社区层面到国家和国际层面。本章一开始就深入探讨了哲学家们是如何看待这些问题的。然后研究主要参与者如何应对机遇和威胁。本章最重要的主题是依赖问题,这可以说是信息时代最被忽视的安全方面。
{"title":"Opportunity, Threat, and Dependency in the Social Infosphere","authors":"Greg Austin","doi":"10.1093/oxfordhb/9780198800682.013.2","DOIUrl":"https://doi.org/10.1093/oxfordhb/9780198800682.013.2","url":null,"abstract":"The technological revolution outlined in the previous chapter has unleashed a social upheaval. If a suite of machines came to be so central in global and national social order, as well as in our personal lives, how does that affect our security? Bearing in mind that we are only at the dawn of the cyber age, what will the future hold? This chapter gives an overview of the profound impact of the information revolution on human welfare for better and for worse, from the individual and community levels to the national and international levels. The chapter begins with some insight into how philosophers have viewed these questions. It then looks at how leading actors have responded to the opportunities and threats. The chapter’s most important single theme is the issue of dependency, arguably the most ignored security aspect of the information age.","PeriodicalId":336846,"journal":{"name":"The Oxford Handbook of Cyber Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129867396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
The Oxford Handbook of Cyber Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1