Ethics and Policies for Cyber Operations 2016
DOI: 10.1007/978-3-319-45300-2_7
|View full text |Cite
|
Sign up to set email alerts
|

Military Objectives in Cyber Warfare

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(5 citation statements)
references
References 10 publications
0
5
0
Order By: Relevance
“…In general, the term "cyberwar" is used for potentially dangerous operations in cyberspace, i.e. a war that takes place in and through computers, in digital networks that connect them, and in which states or their proxies participate against other states (Roscini, 2016;Paziuk, 2022). Cyber warfare is usually waged against adversaries' governmental or military digital networks to damage, destroy, or block their use.…”
Section: Using International Conventions To Counter Cyber Threats And...mentioning
confidence: 99%
“…In general, the term "cyberwar" is used for potentially dangerous operations in cyberspace, i.e. a war that takes place in and through computers, in digital networks that connect them, and in which states or their proxies participate against other states (Roscini, 2016;Paziuk, 2022). Cyber warfare is usually waged against adversaries' governmental or military digital networks to damage, destroy, or block their use.…”
Section: Using International Conventions To Counter Cyber Threats And...mentioning
confidence: 99%
“…The criterion is controversial in its original legal function as a measure of attack severity legitimising a military response, because it treats as an attack the physical destruction of a single server but not the incapacitation of an object (e.g. civilian power station) for days (Roscini 2017). However, our question here does not concern the justification of acts of wars, thus the distinction is far less problematic in our context.…”
Section: Cybersecurity Of Critical Infrastructurementioning
confidence: 99%
“…However, some such attacks do, for example, the use of drones hacked or guided by malicious AI to carry explosives in the proximity of a dam. An instance of A2 (physical attack without physical damage) can be the use of graphite bombs, which spread extremely fine carbon filaments over electrical components that cause fully recoverable physical damage to the infrastructure: a short-circuit and a disruption of the electrical supply (Roscini 2017). This clearly counts as a cybersecurity threat, and it may not count as a physical attack according to our definition, as it is possible that no physical component needs replacement.…”
Section: Cybersecurity Of Critical Infrastructurementioning
confidence: 99%
See 2 more Smart Citations