Kids Library Home

Welcome to the Kids' Library!

Search for books, movies, music, magazines, and more.

     
Available items only
Record 12 of 150
Previous Record Next Record
Print Material
Author Hill, Amanda G., author.

Title The ultimate challenge : attribution for cyber operations / Amanda G. Hill, Major, USAF.

Publication Info. Attribution for cyber operations
Maxwell Air Force Base, Alabama : Air University Press, Muir S. Fairchild Research Information Center, 2019.

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  D 301.26/30:70    ---  Available
Description 1 online resource (v, 34 pages) : color illustrations
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
Series Wright flyer paper ; no. 70
Wright flyer paper ; no. 70.
Note "Air University, Air Command and Staff College."
"Accepted by Air University Press February 2018 and published November 2019"--Page ii
Bibliography Includes bibliographical references (pages 33-34).
Contents Foreword. -- Abstract. -- Introduction. -- Background. Principles of the DoD Law of War Manual and cyber operations. Attribution and the Law of Armed Conflict. Tallinn Manual on the International Law applicable to cyber warfare. Attributing responsibility to a state. Attribution and non-state actors. -- Analysis. Limitations of attribution. Introduction into multi-dimensional approach to attribution. Evidentiary considerations in attribution. -- Conclusion. -- Abbreviations. -- Bibliography.
Summary "The inherent nature of cyberspace has created an opportunity for adversaries to exploit vulnerabilities of victim state's cyberinfrastructures anonymously for a myriad of reasons. States and nonstate actors can use multiple avenues and techniques to route malicious malware with relative ease and safety. Further, states can utilize nonstate actors in their efforts to achieve political goals with the ability to deny involvement in the act. This is due to both the nature of cyberspace, deficiencies in international law, and the limitations of technical attribution. Therefore, this paper explores what factors, under international law, could be considered in holding nation-states or nonstate actors accountable for malicious cyber acts. The problem/solution method is used to review the relevant deficiencies in international law, general problems associated with attribution in the cyber domain, and other variables that could produce a more comprehensive assessment of whether a particular entity should be held accountable for a cyber action. Instituting and utilizing a multi-dimensional approach to attribution can provide the information necessary to determine responsibility for malicious cyber acts and provide victim states the confidence to respond appropriately."--Abstract
Note Online resource; title from PDF title page (viewed on December 17, 2019).
Subject Cyberterrorism -- Law and legislation.
Computer networks -- Law and legislation.
Cyberterrorism -- International cooperation.
Prosecution -- International cooperation.
Cyberterrorism -- Law and legislation. (OCoLC)fst01909447
Computer networks -- Law and legislation. (OCoLC)fst00872320
Cyberspace operations (Military science) (OCoLC)fst01909446
War (International law) (OCoLC)fst01170412
Added Author Air University (U.S.). Air Command and Staff College, issuing body.
Muir S. Fairchild Research Information Center, issuing body.
Air University (U.S.). Press, publisher.
Gpo Item No. 0422-K-09 (online)
Sudoc No. D 301.26/30:70

 
    
Available items only