Skip to content
University of Maryland LibrariesDigital Repository at the University of Maryland
    • Login
    View Item 
    •   DRUM
    • Center for International and Security Studies at Maryland
    • Center for International and Security Studies at Maryland Research Works
    • View Item
    •   DRUM
    • Center for International and Security Studies at Maryland
    • Center for International and Security Studies at Maryland Research Works
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Reducing the Threat of State-to-State Cyber Attack against Critical Infrastructure through International Norms and Agreements

    Thumbnail
    View/Open
    reducing_the_threat_of_statetostate_cyber_attack_against_critical_infrastructure__120910.pdf (134.9Kb)
    No. of downloads: 278

    Date
    2010-12
    Author
    Henry, Jamal
    DRUM DOI
    https://doi.org/10.13016/M23W42
    Metadata
    Show full item record
    Abstract
    The global proliferation of networked computer systems within the public and private sectors presents an increased opportunity for malicious cyber attacks to disrupt the daily functions of governments, national emergency systems, the global economy, and our modern way of life. The potentially pandemic nature of network failures presents opportunities for states to work together to identify key infrastructure sectors of shared interest and formulate international norms and strategies to protect them from cyber attacks and prevent cascading failures within modern society. Nation-states that share information infrastructure critical to modern social functions will have a vested interest in protecting these systems from cyber attacks while mitigating their own inclination to attack these same networks. This paper outlines the state-to-state cyber threat to critical-system infrastructures and the role international agreements can play in limiting this threat. The paper has been structured as follows. It begins by defining a critical system and discussing the actors who pose threats to these systems and the motivations behind their decisions. This is followed by a detailed description of a hypothetical scenario that depicts the methods by which one state could attack another state’s critical infrastructure, to include the motivations behind the attack. In conclusion, it makes recommendations regarding the development of an international agreement designed to limit this specific type of attack.
    URI
    http://hdl.handle.net/1903/15973
    Collections
    • Center for International and Security Studies at Maryland Research Works

    DRUM is brought to you by the University of Maryland Libraries
    University of Maryland, College Park, MD 20742-7011 (301)314-1328.
    Please send us your comments.
    Web Accessibility
     

     

    Browse

    All of DRUMCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsThis CollectionBy Issue DateAuthorsTitlesSubjects

    My Account

    LoginRegister
    Pages
    About DRUMAbout Download Statistics

    DRUM is brought to you by the University of Maryland Libraries
    University of Maryland, College Park, MD 20742-7011 (301)314-1328.
    Please send us your comments.
    Web Accessibility