• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 3
  • 1
  • 1
  • Tagged with
  • 6
  • 6
  • 3
  • 3
  • 3
  • 3
  • 2
  • 2
  • 2
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

CYBERWAR - Det virtuella kriget

Jusufovic, Almin January 2014 (has links)
Syftet med denna uppsats är bland annat att utforskabegreppet cyber-war. Cyber-attacker utgör stora hot mot infrastrukturen,datorstyrda system och nätverksbaserade tjänster, enligt tidigare forskning. Menhur hotfulla är dessa attacker egentligen? Ska vi frukta att framtida krig blirvirtuella? Kan en ond grupp av människor med några rader av kod få kontroll övervår nation? För att få en bättre förståelse och för att kunna svara på frågorna, harjag med hjälp av tidigare publicerade publikationer gjort en litteraturanalys.Analysen bygger på sammanställning och jämförelse av åtta olika publikationer.Enligt forskningen så tyder tecken på att cyber-war kan vara ett framtida hot. / The purpose of this paper is to explore the concept of cyber-war. Cyber-attacks pose major threats to infrastructure, computer systems and network-based services, according to previous research. But how threatening are these attacks? Should we fear that future wars will be virtual? Can a group of people with a few lines of code get control of our nation? To get a better understanding and be able to answer these questions, I have used previously published publications and have made a literature analysis. The analysis is based on a compilation and comparison of eight different publications. According to the research, cyber-war may be a future threat.
2

Does international human rights law impose constraints on digital manipulation or other cyberwarfare ruses? Analysis of the stuxnet worm attack on iranian nuclear facilities

Zhuk, Alesia January 2017 (has links)
Tesis (magíster en derecho económico, inversiones, comercio y arbitraje internacional) Universidad de Chile, Universidad de Heidelberg / In 2010 a malicious computer worm attacked Iranian nuclear facilities in Natanz. It was the first computer worm that caused physical damage, and because of this, Iran had to suspend its nuclear program approximately for two years. The case caused great concern among the international community and raised the issue of protecting the population. This paper will address the issues of cyber war and its relationship with International Humanitarian Law and International Human Rights Law.
3

The SAP Link: A Controller Architecture for Secure Industrial Control Systems

Wyman, Matthew Cody 01 February 2019 (has links)
Industrial Control Systems are essential to modern life. They are utilized in hundreds of processes including power distribution, water treatment, manufacturing, traffic management, and amusement park ride control. These systems are an essential part of modern life and if compromised, could result in significant economic loss, safety impacts, damage to the environment, and even loss of life. Unfortunately, many of these systems are not properly secured from a cyber attack. It is likely that a well-funded and motivated attack from a nation-state will successfully compromise an industrial control system's network. As cyber war becomes more prevalent, it is becoming more critical to find new and innovative ways to reduce the physical impacts from a cyber attack.This thesis presents a new architecture for a secure industrial controller. This architecture protects the integrity of the controller logic, including the safety logic which is responsible for keeping the process in a safe condition. In particular, it would prevent malicious or accidental modification or bypassing of the controller logic. This architecture divides the controller into three components; the logic controller, the interface controller and the SAP link. The logic controller is responsible for controlling the equipment and contains the safety logic. The interface controller communicates with the rest of the control system network. The Simple As Possible (SAP) link is a bridge between the logic and interface controllers that ensures the integrity of the logic controller by drastically limiting the external interface of the logic controller. We implement this new architecture on a physical controller to demonstrate the process of implementing the architecture and to demonstrate its feasibility.
4

Evaluating Cyber war

Lee, Jonathan Iming 21 February 2011 (has links)
Richard A. Clarke and Robert K. Knake’s book, Cyber war, claims to identify a new threat and vulnerability in the United States. By examining the points they make and evaluating them in the context of the first cyber attack, STUXNET, we shall conclude that the technical argument is correct; however the overall argument is incomplete. What they fail to emphasize is the amount of human intelligence involved in committing a successful cyber attack, and the extent to which having intelligence operations greatly enhances a state's cyber capabilities. / text
5

Nový MHP rámec pro kybernetickou válku / New IHL Framework for Cyber Warfare

Knopová, Eva January 2016 (has links)
NEW IHL FRAMEWORK FOR CYBER WARFARE - ABSTRACT Regarding the increasing number of revealed cyber-attacks aimed at public facilities including the governmental ones by who seems to be other state actors, this thesis aims to reveal the major importance of cyber warfare, point out the fatal vacuum regarding the IHL framework currently in force and suggests its completion by a new IHL convention, which would regulate cyberwarfare in International Armed Conflicts. In order to provide a well-structured and pertinent arguments to support its main points, the thesis uses methods of qualitative analysis of the current IHL sources including international treaties, customary law and work of the main institutions of international justice along with work of judicial scholars and cyber experts. The work contains five main chapters. The first chapter presents the underlining principles of Laws of Wars, including its theory, history and development; and focuses on one of its three main regimes - the International Humanitarian Law. The second part is dedicated to the topic of cyber warfare, defines its scope as computer network attacks, explains their classification system, analyses their effects and provides examples of such attacks. The third chapter focuses on the issue of the current legal vacuum in relation to cyber...
6

La participation directe dans les conflits armés et la notion de combattant : l'externalisation des activités militaires. / The concept of direct participation in hostilities and the notion of combatant : outsourcing of military activities

Kalhor, Alireza 10 May 2013 (has links)
La notion de participation directe aux hostilités n’a jamais été définie de manière précise au regard du droit international humanitaire. Cette ambiguïté a conduit à des interprétations divergentes du concept d’hostilités et des critères juridiques utilisés pour définir une participation directe par opposition à une participation indirecte (effort de guerre).D’ailleurs, les conflits contemporains posent de nouveaux défis quant à la définition et la mise en oeuvre de la notion de la participation directe aux hostilités. Les moyens de guerre de haute technicité (l’attaque de réseaux informatiques) et l’externalisation des forces armées (sociétés militaire privées), illustrent l’imbrication croissante des activités civiles et militaires et la difficulté à identifier précisément qui participe directement aux hostilités et quelles sont les mesures à prendre pour protéger ceux qui n’y participent pas directement. / The notion of direct participation in hostilities has never been precisely defined in international humanitarian law. This ambiguity has led to differing interpretations of the concept of hostilities and legal criteria imply a distinction from direct participation in hostilities as opposed indirect participation (war effort).Indeed, contemporary conflicts have given rise to further challenges in terms of defining and implementing the notion of direct participation in hostilities. The use of high-tech warfare (computer network attack), privatization of the armed forces (private military company), among others, illustrate the increased intermingling of civilian and military activities which make it difficult to determine who is taking a direct part in hostilities and what measures should be taken to protect those who are not directly participating.

Page generated in 0.0573 seconds