首页 > 最新文献

The Oxford Handbook of Cyber Security最新文献

英文 中文
A Political History of Cyberspace 网络空间政治史
Pub Date : 2021-11-04 DOI: 10.1093/oxfordhb/9780198800682.013.3
Madeline Carr
The political history of cyberspace can reveal much about contemporary and future cyber security challenges. This chapter includes some technological history but, more importantly, it also addresses the political forces and trends that fundamentally shaped the development of cyberspace. In doing so, it provides insight into why cyber security is much more than a technical challenge, and why politics can be simultaneously an obstruction to better global cyber security and also the best hope for it. Observing how political perceptions of cyber security threats have both changed and remained constant over time helps put current approaches into perspective, avoiding the two reductionist arguments that either ‘everything is different now’ or ‘it is the same as it ever was’. Addressing future challenges like the Internet of Things and future remedies like emergent cyber norms require a sound understanding of the past. Essentially, this chapter calls for much more careful and comprehensive engagement with the interrelationship between technological developments and political forces.
网络空间的政治史可以揭示当代和未来的网络安全挑战。这一章包括一些技术历史,但更重要的是,它也讨论了从根本上塑造网络空间发展的政治力量和趋势。在此过程中,它提供了洞察为什么网络安全不仅仅是一个技术挑战,以及为什么政治可以同时成为更好的全球网络安全的障碍,也是最好的希望。观察对网络安全威胁的政治看法是如何随着时间的推移而改变和保持不变的,有助于正确看待当前的方法,避免两种简化论者的论点,即要么“现在一切都不同了”,要么“它和以前一样”。应对未来的挑战,如物联网和未来的补救措施,如新兴的网络规范,需要对过去有充分的了解。从本质上讲,本章要求对技术发展和政治力量之间的相互关系进行更仔细和全面的研究。
{"title":"A Political History of Cyberspace","authors":"Madeline Carr","doi":"10.1093/oxfordhb/9780198800682.013.3","DOIUrl":"https://doi.org/10.1093/oxfordhb/9780198800682.013.3","url":null,"abstract":"The political history of cyberspace can reveal much about contemporary and future cyber security challenges. This chapter includes some technological history but, more importantly, it also addresses the political forces and trends that fundamentally shaped the development of cyberspace. In doing so, it provides insight into why cyber security is much more than a technical challenge, and why politics can be simultaneously an obstruction to better global cyber security and also the best hope for it. Observing how political perceptions of cyber security threats have both changed and remained constant over time helps put current approaches into perspective, avoiding the two reductionist arguments that either ‘everything is different now’ or ‘it is the same as it ever was’. Addressing future challenges like the Internet of Things and future remedies like emergent cyber norms require a sound understanding of the past. Essentially, this chapter calls for much more careful and comprehensive engagement with the interrelationship between technological developments and political forces.","PeriodicalId":336846,"journal":{"name":"The Oxford Handbook of Cyber Security","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121207556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Semi-Formal Diplomacy 半正式的外交
Pub Date : 2021-11-04 DOI: 10.1093/oxfordhb/9780198800682.013.33
Nigel Inkster
This chapter assesses semi-official diplomacy in the cyber domain. It begins by describing Track 2 and Track 1.5 diplomacy. Track 2 diplomacy consists of a broad spectrum of activities ranging from academic conferences designed to address specific conflict-related diplomatic issues to much more generic people-to-people contacts designed to create a climate of greater mutual understanding. Meanwhile, Track 1.5 diplomacy seeks to leverage the strengths of both Track 1 and Track 2 diplomacy. It became clear from an early stage that the United States, Russia, and China were in a position to determine the strategic evolution of the cyber domain due to their status as global geo-political actors, their advanced cyber capabilities, their possession of nuclear weapons, and their differences in values and ideology. Russia was the first to make a move towards semi-official diplomacy. Whereas Russia has taken a leading role in international negotiations on cyber governance and cybersecurity, China has arguably become more consequential in terms of how its relationship with the United States will shape the normative culture of the cyber domain. The chapter then considers other examples of semi-official diplomacy as well as prospects for further semi-official diplomacy in the cyber domain.
本章评估网络领域的半官方外交。它首先描述了第二轨和1.5轨外交。第二轨道外交包括范围广泛的活动,从旨在解决与冲突有关的具体外交问题的学术会议,到旨在创造增进相互了解气氛的更为普遍的民间接触。与此同时,1.5轨外交寻求利用1轨和2轨外交的优势。从一开始就很清楚,由于美国、俄罗斯和中国作为全球地缘政治参与者的地位、先进的网络能力、拥有核武器以及价值观和意识形态的差异,它们处于决定网络领域战略演变的位置。俄罗斯是第一个采取半官方外交的国家。尽管俄罗斯在网络治理和网络安全的国际谈判中发挥了主导作用,但在与美国的关系将如何塑造网络领域的规范文化方面,中国可以说已经变得更加重要。然后,本章考虑了半官方外交的其他例子,以及在网络领域进一步半官方外交的前景。
{"title":"Semi-Formal Diplomacy","authors":"Nigel Inkster","doi":"10.1093/oxfordhb/9780198800682.013.33","DOIUrl":"https://doi.org/10.1093/oxfordhb/9780198800682.013.33","url":null,"abstract":"This chapter assesses semi-official diplomacy in the cyber domain. It begins by describing Track 2 and Track 1.5 diplomacy. Track 2 diplomacy consists of a broad spectrum of activities ranging from academic conferences designed to address specific conflict-related diplomatic issues to much more generic people-to-people contacts designed to create a climate of greater mutual understanding. Meanwhile, Track 1.5 diplomacy seeks to leverage the strengths of both Track 1 and Track 2 diplomacy. It became clear from an early stage that the United States, Russia, and China were in a position to determine the strategic evolution of the cyber domain due to their status as global geo-political actors, their advanced cyber capabilities, their possession of nuclear weapons, and their differences in values and ideology. Russia was the first to make a move towards semi-official diplomacy. Whereas Russia has taken a leading role in international negotiations on cyber governance and cybersecurity, China has arguably become more consequential in terms of how its relationship with the United States will shape the normative culture of the cyber domain. The chapter then considers other examples of semi-official diplomacy as well as prospects for further semi-official diplomacy in the cyber domain.","PeriodicalId":336846,"journal":{"name":"The Oxford Handbook of Cyber Security","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127843865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Look West or Look East? India at the Crossroads of Cyberspace 向西看还是向东看?印度处于网络空间的十字路口
Pub Date : 2021-11-04 DOI: 10.1093/oxfordhb/9780198800682.013.41
A. Sukumar
This chapter explores how India has managed its external environment with a view to securing its own digital ecosystems. It highlights India’s engagement with the United States and China, the biggest players in its digital ecosystem. Both relationships reflect certain geopolitical realities, but also offer contrasting narratives. India and the United States have sought in recent years to align their views on the governance of common digital spaces, whereas New Delhi's outreach to China has been more instrumental, and largely confined to interactions with specific Chinese companies that invest in the country. Mindful, however, of Beijing's potential to expand its influence in Asian economies by supplying their digital infrastructure and applications, India has acknowledged the need to engage China at a strategic level on ‘cyber’ issues. Its high-level interactions with the United States and China could lead India to a crossroads from where it has to choose one model of standards, rules, and norms for cybersecurity and Internet governance over the other.
本章探讨印度如何管理其外部环境,以保护其自己的数字生态系统。它凸显了印度与美国和中国的接触,这两个国家是印度数字生态系统中最大的参与者。这两种关系都反映了一定的地缘政治现实,但也提供了截然不同的叙述。近年来,印度和美国一直在寻求就共同数字空间的治理达成一致,而新德里与中国的接触更多的是工具性的,而且主要局限于与在印度投资的特定中国公司的互动。然而,考虑到北京有可能通过向亚洲经济体提供数字基础设施和应用来扩大其在亚洲经济体中的影响力,印度承认有必要在“网络”问题上从战略层面与中国接触。印度与美国和中国的高层互动可能会把印度带到一个十字路口,在那里它必须选择一种网络安全和互联网治理的标准、规则和规范模式,而不是另一种模式。
{"title":"Look West or Look East? India at the Crossroads of Cyberspace","authors":"A. Sukumar","doi":"10.1093/oxfordhb/9780198800682.013.41","DOIUrl":"https://doi.org/10.1093/oxfordhb/9780198800682.013.41","url":null,"abstract":"This chapter explores how India has managed its external environment with a view to securing its own digital ecosystems. It highlights India’s engagement with the United States and China, the biggest players in its digital ecosystem. Both relationships reflect certain geopolitical realities, but also offer contrasting narratives. India and the United States have sought in recent years to align their views on the governance of common digital spaces, whereas New Delhi's outreach to China has been more instrumental, and largely confined to interactions with specific Chinese companies that invest in the country. Mindful, however, of Beijing's potential to expand its influence in Asian economies by supplying their digital infrastructure and applications, India has acknowledged the need to engage China at a strategic level on ‘cyber’ issues. Its high-level interactions with the United States and China could lead India to a crossroads from where it has to choose one model of standards, rules, and norms for cybersecurity and Internet governance over the other.","PeriodicalId":336846,"journal":{"name":"The Oxford Handbook of Cyber Security","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127958277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cybersecurity, Human Rights, and Empiricism 网络安全、人权和经验主义
Pub Date : 2021-11-04 DOI: 10.1093/oxfordhb/9780198800682.013.56
J. Penney
This chapter examines recent research on the impact of surveillance, both mass and targeted forms, and considers these insights and their implications for cybersecurity. State surveillance has been central to the ‘securitization’ in cybersecurity, particularly the increasing sophistication and expansion of digital surveillance. The chapter looks at different theoretical and empirical approaches to understanding the impact of such surveillance activities, particularly surveillance studies and chilling effects theory. It also considers how new research shows that surveillance has an impact on a range of fundamental human rights and freedoms, with important implications for civil society and deliberative democracy. Awareness of surveillance, or the threat of it, can have a substantial chilling effect on people’s exercise of these rights, leading them to self-censor or avoid seeking or imparting certain sensitive information. Surveillance can also be said to violate international rights against discrimination and protections for minorities, in that it has unequal or disproportionate impact on certain groups, including vulnerable minorities. The chapter then argues for new frameworks for cybersecurity centred on civil society or human rights.
本章考察了最近关于监控影响的研究,包括大规模和有针对性的形式,并考虑了这些见解及其对网络安全的影响。国家监控一直是网络安全“证券化”的核心,尤其是数字监控的日益复杂和扩展。本章着眼于不同的理论和经验方法来理解此类监视活动的影响,特别是监视研究和寒蝉效应理论。它还考虑了新的研究如何表明监视对一系列基本人权和自由产生影响,对公民社会和协商民主具有重要影响。意识到监视或监视的威胁会对人们行使这些权利产生实质性的寒蝉效应,导致他们自我审查或避免寻求或传递某些敏感信息。监视也可以说违反了反对歧视和保护少数群体的国际权利,因为它对某些群体,包括脆弱的少数群体产生了不平等或不成比例的影响。然后,本章主张建立以公民社会或人权为中心的网络安全新框架。
{"title":"Cybersecurity, Human Rights, and Empiricism","authors":"J. Penney","doi":"10.1093/oxfordhb/9780198800682.013.56","DOIUrl":"https://doi.org/10.1093/oxfordhb/9780198800682.013.56","url":null,"abstract":"This chapter examines recent research on the impact of surveillance, both mass and targeted forms, and considers these insights and their implications for cybersecurity. State surveillance has been central to the ‘securitization’ in cybersecurity, particularly the increasing sophistication and expansion of digital surveillance. The chapter looks at different theoretical and empirical approaches to understanding the impact of such surveillance activities, particularly surveillance studies and chilling effects theory. It also considers how new research shows that surveillance has an impact on a range of fundamental human rights and freedoms, with important implications for civil society and deliberative democracy. Awareness of surveillance, or the threat of it, can have a substantial chilling effect on people’s exercise of these rights, leading them to self-censor or avoid seeking or imparting certain sensitive information. Surveillance can also be said to violate international rights against discrimination and protections for minorities, in that it has unequal or disproportionate impact on certain groups, including vulnerable minorities. The chapter then argues for new frameworks for cybersecurity centred on civil society or human rights.","PeriodicalId":336846,"journal":{"name":"The Oxford Handbook of Cyber Security","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131782736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Stepping out of the Shadow 走出阴影
Pub Date : 2021-11-04 DOI: 10.1093/oxfordhb/9780198800682.013.17
Nicole van der Meulen
After the discovery of the Morris Worm in November 1988, the first Computer Emergency Response Team (CERT) was established. During the following years, other CERTs or Computer Security Incident Response Teams (CSIRTs) were established in different parts of the globe. Now, three decades later, CSIRTs have become an integral part of the cyber security ecosystem. This chapter aims to provide an insight into the evolution of CSIRTs by describing their historical background, their different types and services, as well as the challenges they are encountering as the topic of cyber security becomes more pertinent and political.
1988年11月发现莫里斯蠕虫后,成立了第一个计算机应急响应小组(CERT)。在接下来的几年里,其他cert或计算机安全事件响应小组(csirt)在全球不同地区建立起来。三十年后的今天,csirt已成为网络安全生态系统不可或缺的一部分。本章旨在通过描述csirt的历史背景、不同类型和服务,以及随着网络安全主题变得更加相关和政治,他们所面临的挑战,深入了解csirt的发展。
{"title":"Stepping out of the Shadow","authors":"Nicole van der Meulen","doi":"10.1093/oxfordhb/9780198800682.013.17","DOIUrl":"https://doi.org/10.1093/oxfordhb/9780198800682.013.17","url":null,"abstract":"After the discovery of the Morris Worm in November 1988, the first Computer Emergency Response Team (CERT) was established. During the following years, other CERTs or Computer Security Incident Response Teams (CSIRTs) were established in different parts of the globe. Now, three decades later, CSIRTs have become an integral part of the cyber security ecosystem. This chapter aims to provide an insight into the evolution of CSIRTs by describing their historical background, their different types and services, as well as the challenges they are encountering as the topic of cyber security becomes more pertinent and political.","PeriodicalId":336846,"journal":{"name":"The Oxford Handbook of Cyber Security","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128608051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
‘Cybersecurity’ and ‘Development’ “网络保护与发展”
Pub Date : 2021-11-04 DOI: 10.1093/oxfordhb/9780198800682.013.59
T. Unwin
The links between cybersecurity and international development are crucially important, especially for the world’s poorest and most marginalized countries and people. Yet, they have rarely been explored in detail, and all too often international initiatives designed to support development have paid insufficient attention to cybersecurity issues. In large part, this is because the communities of expertise in the two fields are often distinct and separate, speak different languages, have different interests, and are physically located in different organizations and places. Cybersecurity tends to be the domain of computer scientists, security agencies, telecommunication ministries, the private sector, and foreign policy organizations, whereas international development is largely the field of social scientists, development specialists, aid ministries, civil society, and humanitarian organizations. This separation is true of most bilateral and multilateral donors, and, as a result technology-supported aid initiatives frequently ignore fundamentally important issues around digital security. This chapter provides an overview of the intersections between the two, why they are important, and what can be done to improve integration between them in the interests of reducing inequalities and poverty.
网络安全和国际发展之间的联系至关重要,特别是对世界上最贫穷和最边缘化的国家和人民。然而,这些问题很少得到详细探讨,而且旨在支持发展的国际倡议往往对网络安全问题关注不足。在很大程度上,这是因为这两个领域的专家社区往往是截然不同的,彼此分离的,讲不同的语言,有不同的兴趣,并且位于不同的组织和地方。网络安全往往是计算机科学家、安全机构、电信部门、私营部门和外交政策组织的领域,而国际发展主要是社会科学家、发展专家、援助部门、民间社会和人道主义组织的领域。大多数双边和多边捐助者都存在这种分离,因此,技术支持的援助计划经常忽视与数字安全有关的根本重要问题。本章概述了两者之间的交集,为什么它们很重要,以及为了减少不平等和贫困,可以做些什么来改善它们之间的融合。
{"title":"‘Cybersecurity’ and ‘Development’","authors":"T. Unwin","doi":"10.1093/oxfordhb/9780198800682.013.59","DOIUrl":"https://doi.org/10.1093/oxfordhb/9780198800682.013.59","url":null,"abstract":"The links between cybersecurity and international development are crucially important, especially for the world’s poorest and most marginalized countries and people. Yet, they have rarely been explored in detail, and all too often international initiatives designed to support development have paid insufficient attention to cybersecurity issues. In large part, this is because the communities of expertise in the two fields are often distinct and separate, speak different languages, have different interests, and are physically located in different organizations and places. Cybersecurity tends to be the domain of computer scientists, security agencies, telecommunication ministries, the private sector, and foreign policy organizations, whereas international development is largely the field of social scientists, development specialists, aid ministries, civil society, and humanitarian organizations. This separation is true of most bilateral and multilateral donors, and, as a result technology-supported aid initiatives frequently ignore fundamentally important issues around digital security. This chapter provides an overview of the intersections between the two, why they are important, and what can be done to improve integration between them in the interests of reducing inequalities and poverty.","PeriodicalId":336846,"journal":{"name":"The Oxford Handbook of Cyber Security","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116940886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Future Human and Behavioural Challenges of Cybersecurity 未来网络安全对人类和行为的挑战
Pub Date : 2021-11-04 DOI: 10.1093/oxfordhb/9780198800682.013.48
D. Ashenden
This chapter explores the future human and behavioural challenges that are likely to have an impact on cybersecurity. It identifies some general challenges that will need to be overcome. The first challenge will be to accept that cybersecurity practitioners are not average end users. It is important to understand cybersecurity as a social practice that is carried out in specific and variable contexts if we are to design successful behavioural and social interventions. The second challenge is to improve the levels of creativity and innovation demonstrated by cybersecurity practitioners. Finally, the third challenge is to look at how we address cybersecurity risk. Meeting these challenges will depend on developing a skill set among cybersecurity practitioners that puts soft skills on a par with technical skills, and establishes trust relationships through genuine dialogue realized through participative approaches to cybersecurity.
本章探讨了未来可能对网络安全产生影响的人类和行为挑战。它确定了一些需要克服的一般性挑战。第一个挑战将是接受网络安全从业者不是普通终端用户这一事实。如果我们要设计成功的行为和社会干预措施,将网络安全理解为在特定和可变环境中进行的社会实践是很重要的。第二个挑战是提高网络安全从业者的创造力和创新水平。最后,第三个挑战是我们如何应对网络安全风险。应对这些挑战将取决于在网络安全从业者中发展一套技能,将软技能与技术技能相提并论,并通过参与式网络安全方法实现真正的对话,建立信任关系。
{"title":"The Future Human and Behavioural Challenges of Cybersecurity","authors":"D. Ashenden","doi":"10.1093/oxfordhb/9780198800682.013.48","DOIUrl":"https://doi.org/10.1093/oxfordhb/9780198800682.013.48","url":null,"abstract":"This chapter explores the future human and behavioural challenges that are likely to have an impact on cybersecurity. It identifies some general challenges that will need to be overcome. The first challenge will be to accept that cybersecurity practitioners are not average end users. It is important to understand cybersecurity as a social practice that is carried out in specific and variable contexts if we are to design successful behavioural and social interventions. The second challenge is to improve the levels of creativity and innovation demonstrated by cybersecurity practitioners. Finally, the third challenge is to look at how we address cybersecurity risk. Meeting these challenges will depend on developing a skill set among cybersecurity practitioners that puts soft skills on a par with technical skills, and establishes trust relationships through genuine dialogue realized through participative approaches to cybersecurity.","PeriodicalId":336846,"journal":{"name":"The Oxford Handbook of Cyber Security","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125679863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
States, Proxies, and (Remote) Offensive Cyber Operations 国家、代理和(远程)进攻性网络行动
Pub Date : 2021-11-04 DOI: 10.1093/oxfordhb/9780198800682.013.35
Tim Maurer
This chapter addresses cyber proxies and offensive cyber operations. The market of cyber force is a complex and dynamic relationship between the state and actors detached from the state that can target a third party beyond a state’s border with unprecedented ease. Only hacking, also known as ‘remote cyber operations’ in the military bureaucracy's vernacular, makes global reach possible at such low cost. Research identifies three main types of proxy relationships between a state and non-state actors: (i) delegation, (ii) orchestration, and (iii) sanctioning. How to manage effectively both proxies and the market for cyber capabilities, both tools and services to the degree they can be separated, is not only of interest for academic scholarship but also for practitioners and policymakers. While a state may face significant challenges in affecting another state’s proxy relationships, it can exercise greater control over its own relationships with cybersecurity companies, hacktivists, and those breaking the law either at home or abroad.
本章讨论网络代理和攻击性网络行动。网络力量市场是国家与脱离国家的行为体之间复杂而动态的关系,这些行为体可以以前所未有的轻松程度瞄准国家边界以外的第三方。只有黑客攻击,也就是军方的行话所说的“远程网络行动”,才能以如此低的成本达到全球范围。研究确定了国家和非国家行为体之间代理关系的三种主要类型:(i)委托,(ii)协调,(iii)制裁。如何有效地管理网络能力的代理和市场,工具和服务在一定程度上可以分离,这不仅是学术研究的兴趣,也是从业者和政策制定者的兴趣。虽然一个国家在影响另一个国家的代理关系方面可能面临重大挑战,但它可以对自己与网络安全公司、黑客活动分子以及国内外违法人员的关系行使更大的控制权。
{"title":"States, Proxies, and (Remote) Offensive Cyber Operations","authors":"Tim Maurer","doi":"10.1093/oxfordhb/9780198800682.013.35","DOIUrl":"https://doi.org/10.1093/oxfordhb/9780198800682.013.35","url":null,"abstract":"This chapter addresses cyber proxies and offensive cyber operations. The market of cyber force is a complex and dynamic relationship between the state and actors detached from the state that can target a third party beyond a state’s border with unprecedented ease. Only hacking, also known as ‘remote cyber operations’ in the military bureaucracy's vernacular, makes global reach possible at such low cost. Research identifies three main types of proxy relationships between a state and non-state actors: (i) delegation, (ii) orchestration, and (iii) sanctioning. How to manage effectively both proxies and the market for cyber capabilities, both tools and services to the degree they can be separated, is not only of interest for academic scholarship but also for practitioners and policymakers. While a state may face significant challenges in affecting another state’s proxy relationships, it can exercise greater control over its own relationships with cybersecurity companies, hacktivists, and those breaking the law either at home or abroad.","PeriodicalId":336846,"journal":{"name":"The Oxford Handbook of Cyber Security","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131670437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Online Child Safety 网上儿童安全
Pub Date : 2021-11-04 DOI: 10.1057/9780230361003.0011
John Carr
{"title":"Online Child Safety","authors":"John Carr","doi":"10.1057/9780230361003.0011","DOIUrl":"https://doi.org/10.1057/9780230361003.0011","url":null,"abstract":"","PeriodicalId":336846,"journal":{"name":"The Oxford Handbook of Cyber Security","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114954318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data Privacy and Security Law 数据隐私和安全法
Pub Date : 2021-11-04 DOI: 10.1093/oxfordhb/9780198800682.013.20
F. Cate, Rachel Dockery
This chapter discusses cybersecurity laws. Many measures employed to enhance cybersecurity pose a risk to privacy. In addition, data protection laws focus only on personally identifiable information, while cybersecurity is also concerned with securing economic data such as trade secrets and company databases, government information, and the systems that transmit and process information. As a practical matter, despite the prominence of security obligations in data protection legislation, these were often downplayed or ignored entirely until recent years. Only as cybersecurity threats became more pressing did regulators begin actively enforcing the security obligations found in most data protection laws. More recently, legislative bodies and regulators have begun adopting cybersecurity-specific obligations. However, even these have often mirrored or been combined with privacy protections, sometimes to the detriment of effective cybersecurity. The chapter describes major categories of cybersecurity law, including unfair or deceptive practices legislation, breach notification laws, and data destruction laws. It also considers the new focus on critical infrastructure and information sharing, the China Cybersecurity Law, and the new challenges to data privacy and security law.
本章讨论网络安全法律。许多用于加强网络安全的措施对隐私构成了风险。此外,数据保护法只关注个人身份信息,而网络安全也涉及保护经济数据,如商业秘密和公司数据库、政府信息以及传输和处理信息的系统。作为一个实际问题,尽管安全义务在数据保护立法中占有突出地位,但直到最近几年,这些义务往往被淡化或完全忽视。只有在网络安全威胁变得更加紧迫的情况下,监管机构才开始积极执行大多数数据保护法中规定的安全义务。最近,立法机构和监管机构已经开始采取网络安全的具体义务。然而,即使是这些措施也经常与隐私保护相对应或相结合,有时会损害有效的网络安全。本章介绍了网络安全法的主要类别,包括不公平或欺诈行为立法、违规通知法和数据销毁法。它还考虑了关键基础设施和信息共享的新焦点,中国网络安全法,以及数据隐私和安全法的新挑战。
{"title":"Data Privacy and Security Law","authors":"F. Cate, Rachel Dockery","doi":"10.1093/oxfordhb/9780198800682.013.20","DOIUrl":"https://doi.org/10.1093/oxfordhb/9780198800682.013.20","url":null,"abstract":"This chapter discusses cybersecurity laws. Many measures employed to enhance cybersecurity pose a risk to privacy. In addition, data protection laws focus only on personally identifiable information, while cybersecurity is also concerned with securing economic data such as trade secrets and company databases, government information, and the systems that transmit and process information. As a practical matter, despite the prominence of security obligations in data protection legislation, these were often downplayed or ignored entirely until recent years. Only as cybersecurity threats became more pressing did regulators begin actively enforcing the security obligations found in most data protection laws. More recently, legislative bodies and regulators have begun adopting cybersecurity-specific obligations. However, even these have often mirrored or been combined with privacy protections, sometimes to the detriment of effective cybersecurity. The chapter describes major categories of cybersecurity law, including unfair or deceptive practices legislation, breach notification laws, and data destruction laws. It also considers the new focus on critical infrastructure and information sharing, the China Cybersecurity Law, and the new challenges to data privacy and security law.","PeriodicalId":336846,"journal":{"name":"The Oxford Handbook of Cyber Security","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134317400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
The Oxford Handbook of Cyber Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1