Book contents
- Unilateral Remedies to Cyber Operations
- Unilateral Remedies to Cyber Operations
- Copyright page
- Dedication
- Contents
- Preface
- Acknowledgements
- Part I Cybersecurity Incidents and International Law
- 1 The Spectre of Cyberwar
- 2 Terminology
- 3 International Legal Framework
- Part II Unilateral Remedies to Cybersecurity Incidents
- Part III Outlines of an Emergency Regime for Cyberspace
- Bibliography
- Index
1 - The Spectre of Cyberwar
from Part I - Cybersecurity Incidents and International Law
Published online by Cambridge University Press: 31 March 2020
- Unilateral Remedies to Cyber Operations
- Unilateral Remedies to Cyber Operations
- Copyright page
- Dedication
- Contents
- Preface
- Acknowledgements
- Part I Cybersecurity Incidents and International Law
- 1 The Spectre of Cyberwar
- 2 Terminology
- 3 International Legal Framework
- Part II Unilateral Remedies to Cybersecurity Incidents
- Part III Outlines of an Emergency Regime for Cyberspace
- Bibliography
- Index
Summary
Describing examples of noteworthy cybersecurity incidents and cyber operations of the past fifteen years, this chapter outlines the current transnational cybersecurity landscape. Focusing on some of the political implications, it is examined how states have reacted to operations that were supposedly carried out by adversarial states, such as the distributed denial-of-service attacks in Estonia in 2007, the Stuxnet operation jointly undertaken by Israel and the United States against the Iranian uranium enrichment programme, incidents triggered by the WannaCry and NotPetya malwares, or the Russian hacking and disinformation campaigns in the run-up to the US presidential election in 2016.
Keywords
- Type
- Chapter
- Information
- Unilateral Remedies to Cyber OperationsSelf-Defence, Countermeasures, Necessity, and the Question of Attribution, pp. 3 - 16Publisher: Cambridge University PressPrint publication year: 2020