首页 > 最新文献

The Oxford Handbook of Cyber Security最新文献

英文 中文
Cybersecurity, Global Commerce, and International Organizations 网络安全,全球商业和国际组织
Pub Date : 2021-11-04 DOI: 10.1093/oxfordhb/9780198800682.013.31
D. Fidler
As private-sector enterprises became dependent on Internet-enabled technologies, cybersecurity threats developed into serious problems in international political economy. This chapter analyses how states use international organizations to address these threats. The chapter explains why international organizations were not prominent in the Internet’s emergence and impact on transnational trade and investment. It examines the main threats companies face, including cybercrime, economic cyber espionage, government surveillance and hacking, innovation in digital technologies, and poor corporate cyber defences. International organizations have been most involved in fighting cybercrime, but these efforts have not been successful. International organizations do not play significant roles in countering other cybersecurity threats in global commerce. The chapter argues that international organizations are unlikely to become more important in the future because geopolitics and shifts in domestic politics in democracies will make collective action on cybersecurity in global commerce more difficult.
随着私营企业对互联网技术的依赖,网络安全威胁已成为国际政治经济中的严重问题。本章分析各国如何利用国际组织来应对这些威胁。这一章解释了为什么国际组织在互联网的出现和对跨国贸易和投资的影响中并不突出。报告研究了企业面临的主要威胁,包括网络犯罪、经济网络间谍活动、政府监控和黑客攻击、数字技术创新以及企业网络防御不力。国际组织一直是打击网络犯罪的主要力量,但这些努力并没有取得成功。国际组织在应对全球商业中的其他网络安全威胁方面没有发挥重要作用。本章认为,国际组织在未来不太可能变得更重要,因为地缘政治和民主国家国内政治的变化将使在全球商业网络安全方面采取集体行动变得更加困难。
{"title":"Cybersecurity, Global Commerce, and International Organizations","authors":"D. Fidler","doi":"10.1093/oxfordhb/9780198800682.013.31","DOIUrl":"https://doi.org/10.1093/oxfordhb/9780198800682.013.31","url":null,"abstract":"As private-sector enterprises became dependent on Internet-enabled technologies, cybersecurity threats developed into serious problems in international political economy. This chapter analyses how states use international organizations to address these threats. The chapter explains why international organizations were not prominent in the Internet’s emergence and impact on transnational trade and investment. It examines the main threats companies face, including cybercrime, economic cyber espionage, government surveillance and hacking, innovation in digital technologies, and poor corporate cyber defences. International organizations have been most involved in fighting cybercrime, but these efforts have not been successful. International organizations do not play significant roles in countering other cybersecurity threats in global commerce. The chapter argues that international organizations are unlikely to become more important in the future because geopolitics and shifts in domestic politics in democracies will make collective action on cybersecurity in global commerce more difficult.","PeriodicalId":336846,"journal":{"name":"The Oxford Handbook of Cyber Security","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128735041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Look West or Look East? India at the Crossroads of Cyberspace 向西看还是向东看?印度处于网络空间的十字路口
Pub Date : 2021-11-04 DOI: 10.1093/oxfordhb/9780198800682.013.41
A. Sukumar
This chapter explores how India has managed its external environment with a view to securing its own digital ecosystems. It highlights India’s engagement with the United States and China, the biggest players in its digital ecosystem. Both relationships reflect certain geopolitical realities, but also offer contrasting narratives. India and the United States have sought in recent years to align their views on the governance of common digital spaces, whereas New Delhi's outreach to China has been more instrumental, and largely confined to interactions with specific Chinese companies that invest in the country. Mindful, however, of Beijing's potential to expand its influence in Asian economies by supplying their digital infrastructure and applications, India has acknowledged the need to engage China at a strategic level on ‘cyber’ issues. Its high-level interactions with the United States and China could lead India to a crossroads from where it has to choose one model of standards, rules, and norms for cybersecurity and Internet governance over the other.
本章探讨印度如何管理其外部环境,以保护其自己的数字生态系统。它凸显了印度与美国和中国的接触,这两个国家是印度数字生态系统中最大的参与者。这两种关系都反映了一定的地缘政治现实,但也提供了截然不同的叙述。近年来,印度和美国一直在寻求就共同数字空间的治理达成一致,而新德里与中国的接触更多的是工具性的,而且主要局限于与在印度投资的特定中国公司的互动。然而,考虑到北京有可能通过向亚洲经济体提供数字基础设施和应用来扩大其在亚洲经济体中的影响力,印度承认有必要在“网络”问题上从战略层面与中国接触。印度与美国和中国的高层互动可能会把印度带到一个十字路口,在那里它必须选择一种网络安全和互联网治理的标准、规则和规范模式,而不是另一种模式。
{"title":"Look West or Look East? India at the Crossroads of Cyberspace","authors":"A. Sukumar","doi":"10.1093/oxfordhb/9780198800682.013.41","DOIUrl":"https://doi.org/10.1093/oxfordhb/9780198800682.013.41","url":null,"abstract":"This chapter explores how India has managed its external environment with a view to securing its own digital ecosystems. It highlights India’s engagement with the United States and China, the biggest players in its digital ecosystem. Both relationships reflect certain geopolitical realities, but also offer contrasting narratives. India and the United States have sought in recent years to align their views on the governance of common digital spaces, whereas New Delhi's outreach to China has been more instrumental, and largely confined to interactions with specific Chinese companies that invest in the country. Mindful, however, of Beijing's potential to expand its influence in Asian economies by supplying their digital infrastructure and applications, India has acknowledged the need to engage China at a strategic level on ‘cyber’ issues. Its high-level interactions with the United States and China could lead India to a crossroads from where it has to choose one model of standards, rules, and norms for cybersecurity and Internet governance over the other.","PeriodicalId":336846,"journal":{"name":"The Oxford Handbook of Cyber Security","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127958277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intentions and Cyberterrorism 意图与网络恐怖主义
Pub Date : 2021-11-04 DOI: 10.1093/oxfordhb/9780198800682.013.10
Florian J. Egloff
This chapter focuses on intentions and cyberterrorists. In defining cyberterrorism as the use, or threat of use, of cyberspace to deliver violence, through the disruption or destruction of digital data, the chapter captures potentially novel behaviour. It highlights the claims made by intelligence officials about terrorists’ intentions of using cyberspace. It then interrogates to what extent this matches the literature on terrorist motivations and intentions, and whether cyberspace is an attractive means for carrying out terrorist attacks. Finding that a simple cost–benefit analysis does not favour cyberspace as a means of carrying out terrorist acts, the chapter interrogates the vectors of change both on the intentions and capability side of the assessment. It closes with the analysis of a hypothetical case that would match the definition of cyberterror: a religiously inspired version of the Ashley Madison hack.
本章主要讨论意图和网络恐怖分子。在将网络恐怖主义定义为利用或威胁使用网络空间,通过破坏或破坏数字数据来实施暴力时,本章捕捉到了潜在的新奇行为。它强调了情报官员关于恐怖分子利用网络空间的意图的说法。然后,它会询问这在多大程度上符合恐怖分子动机和意图的文献,以及网络空间是否是实施恐怖袭击的有吸引力的手段。发现简单的成本效益分析并不支持将网络空间作为实施恐怖主义行为的手段,本章从评估的意图和能力两方面对变革的载体进行了询问。文章最后分析了一个符合网络恐怖定义的假想案例:一个受宗教启发的阿什利·麦迪逊(Ashley Madison)黑客事件。
{"title":"Intentions and Cyberterrorism","authors":"Florian J. Egloff","doi":"10.1093/oxfordhb/9780198800682.013.10","DOIUrl":"https://doi.org/10.1093/oxfordhb/9780198800682.013.10","url":null,"abstract":"This chapter focuses on intentions and cyberterrorists. In defining cyberterrorism as the use, or threat of use, of cyberspace to deliver violence, through the disruption or destruction of digital data, the chapter captures potentially novel behaviour. It highlights the claims made by intelligence officials about terrorists’ intentions of using cyberspace. It then interrogates to what extent this matches the literature on terrorist motivations and intentions, and whether cyberspace is an attractive means for carrying out terrorist attacks. Finding that a simple cost–benefit analysis does not favour cyberspace as a means of carrying out terrorist acts, the chapter interrogates the vectors of change both on the intentions and capability side of the assessment. It closes with the analysis of a hypothetical case that would match the definition of cyberterror: a religiously inspired version of the Ashley Madison hack.","PeriodicalId":336846,"journal":{"name":"The Oxford Handbook of Cyber Security","volume":"1048 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123146218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Semi-Formal Diplomacy 半正式的外交
Pub Date : 2021-11-04 DOI: 10.1093/oxfordhb/9780198800682.013.33
Nigel Inkster
This chapter assesses semi-official diplomacy in the cyber domain. It begins by describing Track 2 and Track 1.5 diplomacy. Track 2 diplomacy consists of a broad spectrum of activities ranging from academic conferences designed to address specific conflict-related diplomatic issues to much more generic people-to-people contacts designed to create a climate of greater mutual understanding. Meanwhile, Track 1.5 diplomacy seeks to leverage the strengths of both Track 1 and Track 2 diplomacy. It became clear from an early stage that the United States, Russia, and China were in a position to determine the strategic evolution of the cyber domain due to their status as global geo-political actors, their advanced cyber capabilities, their possession of nuclear weapons, and their differences in values and ideology. Russia was the first to make a move towards semi-official diplomacy. Whereas Russia has taken a leading role in international negotiations on cyber governance and cybersecurity, China has arguably become more consequential in terms of how its relationship with the United States will shape the normative culture of the cyber domain. The chapter then considers other examples of semi-official diplomacy as well as prospects for further semi-official diplomacy in the cyber domain.
本章评估网络领域的半官方外交。它首先描述了第二轨和1.5轨外交。第二轨道外交包括范围广泛的活动,从旨在解决与冲突有关的具体外交问题的学术会议,到旨在创造增进相互了解气氛的更为普遍的民间接触。与此同时,1.5轨外交寻求利用1轨和2轨外交的优势。从一开始就很清楚,由于美国、俄罗斯和中国作为全球地缘政治参与者的地位、先进的网络能力、拥有核武器以及价值观和意识形态的差异,它们处于决定网络领域战略演变的位置。俄罗斯是第一个采取半官方外交的国家。尽管俄罗斯在网络治理和网络安全的国际谈判中发挥了主导作用,但在与美国的关系将如何塑造网络领域的规范文化方面,中国可以说已经变得更加重要。然后,本章考虑了半官方外交的其他例子,以及在网络领域进一步半官方外交的前景。
{"title":"Semi-Formal Diplomacy","authors":"Nigel Inkster","doi":"10.1093/oxfordhb/9780198800682.013.33","DOIUrl":"https://doi.org/10.1093/oxfordhb/9780198800682.013.33","url":null,"abstract":"This chapter assesses semi-official diplomacy in the cyber domain. It begins by describing Track 2 and Track 1.5 diplomacy. Track 2 diplomacy consists of a broad spectrum of activities ranging from academic conferences designed to address specific conflict-related diplomatic issues to much more generic people-to-people contacts designed to create a climate of greater mutual understanding. Meanwhile, Track 1.5 diplomacy seeks to leverage the strengths of both Track 1 and Track 2 diplomacy. It became clear from an early stage that the United States, Russia, and China were in a position to determine the strategic evolution of the cyber domain due to their status as global geo-political actors, their advanced cyber capabilities, their possession of nuclear weapons, and their differences in values and ideology. Russia was the first to make a move towards semi-official diplomacy. Whereas Russia has taken a leading role in international negotiations on cyber governance and cybersecurity, China has arguably become more consequential in terms of how its relationship with the United States will shape the normative culture of the cyber domain. The chapter then considers other examples of semi-official diplomacy as well as prospects for further semi-official diplomacy in the cyber domain.","PeriodicalId":336846,"journal":{"name":"The Oxford Handbook of Cyber Security","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127843865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Stepping out of the Shadow 走出阴影
Pub Date : 2021-11-04 DOI: 10.1093/oxfordhb/9780198800682.013.17
Nicole van der Meulen
After the discovery of the Morris Worm in November 1988, the first Computer Emergency Response Team (CERT) was established. During the following years, other CERTs or Computer Security Incident Response Teams (CSIRTs) were established in different parts of the globe. Now, three decades later, CSIRTs have become an integral part of the cyber security ecosystem. This chapter aims to provide an insight into the evolution of CSIRTs by describing their historical background, their different types and services, as well as the challenges they are encountering as the topic of cyber security becomes more pertinent and political.
1988年11月发现莫里斯蠕虫后,成立了第一个计算机应急响应小组(CERT)。在接下来的几年里,其他cert或计算机安全事件响应小组(csirt)在全球不同地区建立起来。三十年后的今天,csirt已成为网络安全生态系统不可或缺的一部分。本章旨在通过描述csirt的历史背景、不同类型和服务,以及随着网络安全主题变得更加相关和政治,他们所面临的挑战,深入了解csirt的发展。
{"title":"Stepping out of the Shadow","authors":"Nicole van der Meulen","doi":"10.1093/oxfordhb/9780198800682.013.17","DOIUrl":"https://doi.org/10.1093/oxfordhb/9780198800682.013.17","url":null,"abstract":"After the discovery of the Morris Worm in November 1988, the first Computer Emergency Response Team (CERT) was established. During the following years, other CERTs or Computer Security Incident Response Teams (CSIRTs) were established in different parts of the globe. Now, three decades later, CSIRTs have become an integral part of the cyber security ecosystem. This chapter aims to provide an insight into the evolution of CSIRTs by describing their historical background, their different types and services, as well as the challenges they are encountering as the topic of cyber security becomes more pertinent and political.","PeriodicalId":336846,"journal":{"name":"The Oxford Handbook of Cyber Security","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128608051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
‘Cybersecurity’ and ‘Development’ “网络保护与发展”
Pub Date : 2021-11-04 DOI: 10.1093/oxfordhb/9780198800682.013.59
T. Unwin
The links between cybersecurity and international development are crucially important, especially for the world’s poorest and most marginalized countries and people. Yet, they have rarely been explored in detail, and all too often international initiatives designed to support development have paid insufficient attention to cybersecurity issues. In large part, this is because the communities of expertise in the two fields are often distinct and separate, speak different languages, have different interests, and are physically located in different organizations and places. Cybersecurity tends to be the domain of computer scientists, security agencies, telecommunication ministries, the private sector, and foreign policy organizations, whereas international development is largely the field of social scientists, development specialists, aid ministries, civil society, and humanitarian organizations. This separation is true of most bilateral and multilateral donors, and, as a result technology-supported aid initiatives frequently ignore fundamentally important issues around digital security. This chapter provides an overview of the intersections between the two, why they are important, and what can be done to improve integration between them in the interests of reducing inequalities and poverty.
网络安全和国际发展之间的联系至关重要,特别是对世界上最贫穷和最边缘化的国家和人民。然而,这些问题很少得到详细探讨,而且旨在支持发展的国际倡议往往对网络安全问题关注不足。在很大程度上,这是因为这两个领域的专家社区往往是截然不同的,彼此分离的,讲不同的语言,有不同的兴趣,并且位于不同的组织和地方。网络安全往往是计算机科学家、安全机构、电信部门、私营部门和外交政策组织的领域,而国际发展主要是社会科学家、发展专家、援助部门、民间社会和人道主义组织的领域。大多数双边和多边捐助者都存在这种分离,因此,技术支持的援助计划经常忽视与数字安全有关的根本重要问题。本章概述了两者之间的交集,为什么它们很重要,以及为了减少不平等和贫困,可以做些什么来改善它们之间的融合。
{"title":"‘Cybersecurity’ and ‘Development’","authors":"T. Unwin","doi":"10.1093/oxfordhb/9780198800682.013.59","DOIUrl":"https://doi.org/10.1093/oxfordhb/9780198800682.013.59","url":null,"abstract":"The links between cybersecurity and international development are crucially important, especially for the world’s poorest and most marginalized countries and people. Yet, they have rarely been explored in detail, and all too often international initiatives designed to support development have paid insufficient attention to cybersecurity issues. In large part, this is because the communities of expertise in the two fields are often distinct and separate, speak different languages, have different interests, and are physically located in different organizations and places. Cybersecurity tends to be the domain of computer scientists, security agencies, telecommunication ministries, the private sector, and foreign policy organizations, whereas international development is largely the field of social scientists, development specialists, aid ministries, civil society, and humanitarian organizations. This separation is true of most bilateral and multilateral donors, and, as a result technology-supported aid initiatives frequently ignore fundamentally important issues around digital security. This chapter provides an overview of the intersections between the two, why they are important, and what can be done to improve integration between them in the interests of reducing inequalities and poverty.","PeriodicalId":336846,"journal":{"name":"The Oxford Handbook of Cyber Security","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116940886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Future Human and Behavioural Challenges of Cybersecurity 未来网络安全对人类和行为的挑战
Pub Date : 2021-11-04 DOI: 10.1093/oxfordhb/9780198800682.013.48
D. Ashenden
This chapter explores the future human and behavioural challenges that are likely to have an impact on cybersecurity. It identifies some general challenges that will need to be overcome. The first challenge will be to accept that cybersecurity practitioners are not average end users. It is important to understand cybersecurity as a social practice that is carried out in specific and variable contexts if we are to design successful behavioural and social interventions. The second challenge is to improve the levels of creativity and innovation demonstrated by cybersecurity practitioners. Finally, the third challenge is to look at how we address cybersecurity risk. Meeting these challenges will depend on developing a skill set among cybersecurity practitioners that puts soft skills on a par with technical skills, and establishes trust relationships through genuine dialogue realized through participative approaches to cybersecurity.
本章探讨了未来可能对网络安全产生影响的人类和行为挑战。它确定了一些需要克服的一般性挑战。第一个挑战将是接受网络安全从业者不是普通终端用户这一事实。如果我们要设计成功的行为和社会干预措施,将网络安全理解为在特定和可变环境中进行的社会实践是很重要的。第二个挑战是提高网络安全从业者的创造力和创新水平。最后,第三个挑战是我们如何应对网络安全风险。应对这些挑战将取决于在网络安全从业者中发展一套技能,将软技能与技术技能相提并论,并通过参与式网络安全方法实现真正的对话,建立信任关系。
{"title":"The Future Human and Behavioural Challenges of Cybersecurity","authors":"D. Ashenden","doi":"10.1093/oxfordhb/9780198800682.013.48","DOIUrl":"https://doi.org/10.1093/oxfordhb/9780198800682.013.48","url":null,"abstract":"This chapter explores the future human and behavioural challenges that are likely to have an impact on cybersecurity. It identifies some general challenges that will need to be overcome. The first challenge will be to accept that cybersecurity practitioners are not average end users. It is important to understand cybersecurity as a social practice that is carried out in specific and variable contexts if we are to design successful behavioural and social interventions. The second challenge is to improve the levels of creativity and innovation demonstrated by cybersecurity practitioners. Finally, the third challenge is to look at how we address cybersecurity risk. Meeting these challenges will depend on developing a skill set among cybersecurity practitioners that puts soft skills on a par with technical skills, and establishes trust relationships through genuine dialogue realized through participative approaches to cybersecurity.","PeriodicalId":336846,"journal":{"name":"The Oxford Handbook of Cyber Security","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125679863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
States, Proxies, and (Remote) Offensive Cyber Operations 国家、代理和(远程)进攻性网络行动
Pub Date : 2021-11-04 DOI: 10.1093/oxfordhb/9780198800682.013.35
Tim Maurer
This chapter addresses cyber proxies and offensive cyber operations. The market of cyber force is a complex and dynamic relationship between the state and actors detached from the state that can target a third party beyond a state’s border with unprecedented ease. Only hacking, also known as ‘remote cyber operations’ in the military bureaucracy's vernacular, makes global reach possible at such low cost. Research identifies three main types of proxy relationships between a state and non-state actors: (i) delegation, (ii) orchestration, and (iii) sanctioning. How to manage effectively both proxies and the market for cyber capabilities, both tools and services to the degree they can be separated, is not only of interest for academic scholarship but also for practitioners and policymakers. While a state may face significant challenges in affecting another state’s proxy relationships, it can exercise greater control over its own relationships with cybersecurity companies, hacktivists, and those breaking the law either at home or abroad.
本章讨论网络代理和攻击性网络行动。网络力量市场是国家与脱离国家的行为体之间复杂而动态的关系,这些行为体可以以前所未有的轻松程度瞄准国家边界以外的第三方。只有黑客攻击,也就是军方的行话所说的“远程网络行动”,才能以如此低的成本达到全球范围。研究确定了国家和非国家行为体之间代理关系的三种主要类型:(i)委托,(ii)协调,(iii)制裁。如何有效地管理网络能力的代理和市场,工具和服务在一定程度上可以分离,这不仅是学术研究的兴趣,也是从业者和政策制定者的兴趣。虽然一个国家在影响另一个国家的代理关系方面可能面临重大挑战,但它可以对自己与网络安全公司、黑客活动分子以及国内外违法人员的关系行使更大的控制权。
{"title":"States, Proxies, and (Remote) Offensive Cyber Operations","authors":"Tim Maurer","doi":"10.1093/oxfordhb/9780198800682.013.35","DOIUrl":"https://doi.org/10.1093/oxfordhb/9780198800682.013.35","url":null,"abstract":"This chapter addresses cyber proxies and offensive cyber operations. The market of cyber force is a complex and dynamic relationship between the state and actors detached from the state that can target a third party beyond a state’s border with unprecedented ease. Only hacking, also known as ‘remote cyber operations’ in the military bureaucracy's vernacular, makes global reach possible at such low cost. Research identifies three main types of proxy relationships between a state and non-state actors: (i) delegation, (ii) orchestration, and (iii) sanctioning. How to manage effectively both proxies and the market for cyber capabilities, both tools and services to the degree they can be separated, is not only of interest for academic scholarship but also for practitioners and policymakers. While a state may face significant challenges in affecting another state’s proxy relationships, it can exercise greater control over its own relationships with cybersecurity companies, hacktivists, and those breaking the law either at home or abroad.","PeriodicalId":336846,"journal":{"name":"The Oxford Handbook of Cyber Security","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131670437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Online Child Safety 网上儿童安全
Pub Date : 2021-11-04 DOI: 10.1057/9780230361003.0011
John Carr
{"title":"Online Child Safety","authors":"John Carr","doi":"10.1057/9780230361003.0011","DOIUrl":"https://doi.org/10.1057/9780230361003.0011","url":null,"abstract":"","PeriodicalId":336846,"journal":{"name":"The Oxford Handbook of Cyber Security","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114954318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data Privacy and Security Law 数据隐私和安全法
Pub Date : 2021-11-04 DOI: 10.1093/oxfordhb/9780198800682.013.20
F. Cate, Rachel Dockery
This chapter discusses cybersecurity laws. Many measures employed to enhance cybersecurity pose a risk to privacy. In addition, data protection laws focus only on personally identifiable information, while cybersecurity is also concerned with securing economic data such as trade secrets and company databases, government information, and the systems that transmit and process information. As a practical matter, despite the prominence of security obligations in data protection legislation, these were often downplayed or ignored entirely until recent years. Only as cybersecurity threats became more pressing did regulators begin actively enforcing the security obligations found in most data protection laws. More recently, legislative bodies and regulators have begun adopting cybersecurity-specific obligations. However, even these have often mirrored or been combined with privacy protections, sometimes to the detriment of effective cybersecurity. The chapter describes major categories of cybersecurity law, including unfair or deceptive practices legislation, breach notification laws, and data destruction laws. It also considers the new focus on critical infrastructure and information sharing, the China Cybersecurity Law, and the new challenges to data privacy and security law.
本章讨论网络安全法律。许多用于加强网络安全的措施对隐私构成了风险。此外,数据保护法只关注个人身份信息,而网络安全也涉及保护经济数据,如商业秘密和公司数据库、政府信息以及传输和处理信息的系统。作为一个实际问题,尽管安全义务在数据保护立法中占有突出地位,但直到最近几年,这些义务往往被淡化或完全忽视。只有在网络安全威胁变得更加紧迫的情况下,监管机构才开始积极执行大多数数据保护法中规定的安全义务。最近,立法机构和监管机构已经开始采取网络安全的具体义务。然而,即使是这些措施也经常与隐私保护相对应或相结合,有时会损害有效的网络安全。本章介绍了网络安全法的主要类别,包括不公平或欺诈行为立法、违规通知法和数据销毁法。它还考虑了关键基础设施和信息共享的新焦点,中国网络安全法,以及数据隐私和安全法的新挑战。
{"title":"Data Privacy and Security Law","authors":"F. Cate, Rachel Dockery","doi":"10.1093/oxfordhb/9780198800682.013.20","DOIUrl":"https://doi.org/10.1093/oxfordhb/9780198800682.013.20","url":null,"abstract":"This chapter discusses cybersecurity laws. Many measures employed to enhance cybersecurity pose a risk to privacy. In addition, data protection laws focus only on personally identifiable information, while cybersecurity is also concerned with securing economic data such as trade secrets and company databases, government information, and the systems that transmit and process information. As a practical matter, despite the prominence of security obligations in data protection legislation, these were often downplayed or ignored entirely until recent years. Only as cybersecurity threats became more pressing did regulators begin actively enforcing the security obligations found in most data protection laws. More recently, legislative bodies and regulators have begun adopting cybersecurity-specific obligations. However, even these have often mirrored or been combined with privacy protections, sometimes to the detriment of effective cybersecurity. The chapter describes major categories of cybersecurity law, including unfair or deceptive practices legislation, breach notification laws, and data destruction laws. It also considers the new focus on critical infrastructure and information sharing, the China Cybersecurity Law, and the new challenges to data privacy and security law.","PeriodicalId":336846,"journal":{"name":"The Oxford Handbook of Cyber Security","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134317400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
The Oxford Handbook of Cyber Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1