Self-defence against cyber attacks can be practiced by physical, electronic or digital methods or means. Actual self-defence utilizes conventional weapons to focus on the digital infrastructure of the intruder, for example, the hosts, “servers” from which the digital attacks arise, or other actual targets consistently with the prerequisites of need and proportionality and with international humanitarian law. Electronic responses to a cyber attacks utilize “the employment of electromagnetic energy, directed energy, or anti-radiation weapons to attack forces, installations, or instruments with the purpose of debasing, negating, or obliterating enemy fighting capacity. Cyber defences can be latent or dynamic. While latent safeguards don't include pressure or unapproved interruption into PC systems and hence are not a use of force, the latter are reactions in-kind to a past cyber attack and are indeed attack themselves that may fall inside the remit of the jus ad bellum to the degree that they amount to a use of force. In paper we will examine the use of the law of selfdefence in the cyber discourse. It will be seen that the lessons (examples) learned corresponding to global terrorism are valuable for making a legitimate worldview for self-defence against cyber attacks
Key words: self-defence, cyber attacks, international humanitarian law, jus ad bellum
scite shows how a scientific paper has been cited by providing the context of the citation, a classification describing whether it supports, mentions, or contrasts the cited claim, and a label indicating in which section the citation was made.
The articles in Bibliomed are open access articles licensed under Creative Commons Attribution 4.0 International License (CC BY), which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.
We use cookies and other tracking technologies to work properly, to analyze our website traffic, and to understand where our visitors are coming from. More InfoGot It!