SlideShare ist ein Scribd-Unternehmen logo
1 von 18
Application of principles of international law to
computer network operations management
Adriana Dvoršak
1st international academic conference
on intelligence and security
Contemporary Intelligence Support Systems. 
1. Security of IP (concern of the IETF).
2. Security of networks (focus on CERT).
3. Security of business.
4. The individual's human rights (privacy)
5. National security (state sovereignty, national
interests, cyber warfare).
(Doria, 2007)
Providing security to individuals, business, state.
Concepts of cyber security
and law of armed conflict:
1. military necessity,
2. distinction,
3. proportionality,
4. perfidy,
5. neutrality, and
6. unnecessary suffering.
Principles of international law
(Kanuck, 2007)
CNO in operation Allied force
CNE - NATO, Serbia
CNA – NATO
CND – US (?)
Propaganda - Serbia
Military deception - Serbia
Learning points for NATO
Vulnerabilities
National decision making processes
State practice from the region
Offensive doctrine
Military foreign policy options are expanded
Small states with offensive foreign policy
Can Slovenia advocate cyber offensive?
Article 124 of Constitution: In the provision of security the state
proceeds principally from a policy of peace, and an ethic of
peace and non-aggression.
Legal conditions for CNA
Right for self-defense
Part of general and information warfare
Request from UNSC
Coalitions of the willing supported by UN Resolution
Cyber offensive
CNA CND
TARGET
IW AREAS
TACTICS
TACTICS
WEAPONS ATTRIBUTES
CONSEQUENCES
REACTIONS
perceptions,actions
RECOVERY
DECISION
CONTEXT
CONSIDERATIONS FOR
IW PLANNING
1 Legal,political,social
2 Skil levels, technical
3 Financial
reevaluation
CNO lifecycle model
Adapted from van Niekerk, 2011
The self-defence rule:
Everyone has the right to self-defence.
The cooperation rule:
The fact that a CNA has been conducted via information systems located in
a state’s territory creates a duty to cooperate with the victim state.
The access to information rule:
The public has a right to be informed about threats to their life, security
and well-being.
The mandate rule:
An organisation’s capacity to act (and regulate) derives from its mandate.
The data protection rule:
Information relating to an identified or identifiable natural person is
regarded as personal data.
(Tikk, 2011)
NATO 10 rules
The territoriality rule:
Information infrastructure located within a state’s territory is
subject to that state’s territorial sovereignty.
The responsibility rule:
Fact that CNA was launched from inf.system located in a state’s
territory is evidence that the act is attributable to that state.
The duty of care rule:
Everyone has the responsibility to implement a reasonable level
of security in their information infrastructure.
The early warning rule:
There is an obligation to notify potential victims about known,
upcoming cyber attacks.
The criminality rule:
Every nation has the responsibility to include the most common
cyber offences in its substantive criminal law.
NATO 10 rules
Member States required to have:
• national network and information security (NIS)
strategy;
• NIS cooperation plan;
• NIS competent national authority:
– technical expertise,
– international liasion,
– security breach reporting,
– CERT functions.
• Computer Emergency Response Team (CERT).
EU Directive on common level of NIS
Obligatory breach notification to the competent authority,
it determines which notification is in the public interest
(security intelligence?).
Competent authority requires market operators and public
administrations to:
– provide information needed to assess the security of their NIS;
– undergo a security audit and make the results available to the
competent authority;
– issues binding instructions to market operators and public
administrations.
(Articles 14 and 15)
EU Directive – competent authority
Difference Proposal for a Directive on network and info
security vs Cyber Security Strategy
Cyberdefence policy and capabilities related to Common
Security and Defence Policy (CSDP)
Aims:
– To concentrate on cyberdefence capability on detection,
response and recovery from sophisticated cyber threats;
– synergies between civilian and military approaches.
Cyber Security Strategy and CSDP
High Representative, MS, EDA will assess capability
development:
doctrine, leadership, organisation, personnel, training, technology,
infrastructure, logistics and interoperability.
Develop EU cyberdefence policy:
missions and operations, dynamic risk management, improved
threat analysis, information sharing, training and exercise for
militaries in the EU and multinational context.
Promote dialogue and coordination
– civilian and military actors in the EU,
– international partners, NATO, international organisations.
High Representative activities
National cyber security and cyber defense strategy.
Analysis of external environment
Pressure - normative dimension (EU Directive obligations, NATO
minimum requirements);
Threats.
Internal environment
Changes to legal framework (information society, criminal code,
privacy).
Stakeholders (military, police, academia, civil society,
business).
Synergies between national cyber incident capabilities, CERT,
and competent authority (EU Directive on network and info
security)
Way ahead for Slovenia
Centre vs. Periphery
Global North - Global South relations
Balkanization of CNE
1981 UNGA Declaration on Non-intervention: “the right of states
and peoples to have free access to information and to develop
fully, without interference, their system of information and
mass media, and to use their information media in order to
promote their political, social, economic, and cultural
interests and aspirations.”
Certain CNE amount to an unlawful intervention, e.g. cyber
propaganda activities aimed at fomenting civil upraising in a
target state, interference with elections.
Non-intervention
National assesement
Synergies between national needs and international
requirements
EU Directive
NATO requirements
New institutions
Conclusions
Appendix
Constitution of International Telecommunications Union (1992).
Doria, A. (2007). What do the Words »Internet Security« Mean? In Kleinwoechter (Ed.), The Power of
Ideas: Internet Governance in a Global Multi-Stakeholder Environment. Berlin
Kanuck, S. (2009). Sovereign Discourse on Cyber Conflict under International Law. Texas Law Review,
88.
van Niekerk, B., & Maharaj, M. S. (2011). The Information Warfare Life Cycle Model. SA Journal of
Information Management, Vol 13, No1
European Commission. (2013a). Cyber Security Strategy of the European Union: An Open, Safe and
Secure Cyberspace. Retrieved from http://ec.europa.eu/digital-agenda/en/news/eu-cybersecurity-
plan-protect-open-internet-and-online-freedom-and-opportunity-cyber-security.
European Commission. (2013b). Proposal for a Directive of the European Parliament and of the Council
concerning measures to ensure a high common level of network and information security across the
Union. (COM(2013) 48). Retrieved from http://ec.europa.eu/digital-agenda/en/news/eu-
cybersecurity-plan-protect-open-internet-and-online-freedom-and-opportunity-cyber-security.
Tikk, E. (2011). Ten Rules for Cyber Security. Survival: Global Politics and Strategy, 53(3).
Application of principles of international law to computer networks operations management

Weitere ähnliche Inhalte

Was ist angesagt?

Using Technologies in Crime Prevention and Detection in Nigeria: Legal Issues...
Using Technologies in Crime Prevention and Detection in Nigeria: Legal Issues...Using Technologies in Crime Prevention and Detection in Nigeria: Legal Issues...
Using Technologies in Crime Prevention and Detection in Nigeria: Legal Issues...
International Journal of Modern Research in Engineering and Technology
 
Eu cybersecurity strategy 130207
Eu cybersecurity strategy 130207Eu cybersecurity strategy 130207
Eu cybersecurity strategy 130207
Yury Chemerkin
 
CTO-CybersecurityForum-2010-Andrea Gloriso
CTO-CybersecurityForum-2010-Andrea GlorisoCTO-CybersecurityForum-2010-Andrea Gloriso
CTO-CybersecurityForum-2010-Andrea Gloriso
segughana
 
International strategy cyberspace_factsheet
International strategy cyberspace_factsheetInternational strategy cyberspace_factsheet
International strategy cyberspace_factsheet
bueno buono good
 
Tomasz Czajkowski
Tomasz CzajkowskiTomasz Czajkowski
Tomasz Czajkowski
segughana
 

Was ist angesagt? (20)

2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
 
Using Technologies in Crime Prevention and Detection in Nigeria: Legal Issues...
Using Technologies in Crime Prevention and Detection in Nigeria: Legal Issues...Using Technologies in Crime Prevention and Detection in Nigeria: Legal Issues...
Using Technologies in Crime Prevention and Detection in Nigeria: Legal Issues...
 
International Trends in Mobile Law
International Trends in Mobile LawInternational Trends in Mobile Law
International Trends in Mobile Law
 
Eu cybersecurity strategy 130207
Eu cybersecurity strategy 130207Eu cybersecurity strategy 130207
Eu cybersecurity strategy 130207
 
Cybercrime convention
Cybercrime conventionCybercrime convention
Cybercrime convention
 
CTO-CybersecurityForum-2010-Andrea Gloriso
CTO-CybersecurityForum-2010-Andrea GlorisoCTO-CybersecurityForum-2010-Andrea Gloriso
CTO-CybersecurityForum-2010-Andrea Gloriso
 
Trusted government access to private sector data
Trusted government access to private sector dataTrusted government access to private sector data
Trusted government access to private sector data
 
ID IGF 2016 - Hukum 3 - Peran Negara dalam Kedaulatan Siber
ID IGF 2016 - Hukum 3 - Peran Negara dalam Kedaulatan SiberID IGF 2016 - Hukum 3 - Peran Negara dalam Kedaulatan Siber
ID IGF 2016 - Hukum 3 - Peran Negara dalam Kedaulatan Siber
 
Security technology and democratic legitimacy
Security technology and democratic legitimacySecurity technology and democratic legitimacy
Security technology and democratic legitimacy
 
International strategy cyberspace_factsheet
International strategy cyberspace_factsheetInternational strategy cyberspace_factsheet
International strategy cyberspace_factsheet
 
National Strategy to Secure 5G of the United States of America
National Strategy to Secure 5G of the United States of AmericaNational Strategy to Secure 5G of the United States of America
National Strategy to Secure 5G of the United States of America
 
National Strategies against Cyber Attacks - Philip Victor
National Strategies against Cyber Attacks - Philip VictorNational Strategies against Cyber Attacks - Philip Victor
National Strategies against Cyber Attacks - Philip Victor
 
Why the Private Sector is Key to Cyber Defence
Why the Private Sector is Key to Cyber DefenceWhy the Private Sector is Key to Cyber Defence
Why the Private Sector is Key to Cyber Defence
 
ID IGF 2016 - Opening - IANA Stewardship Transition
ID IGF 2016 - Opening - IANA Stewardship TransitionID IGF 2016 - Opening - IANA Stewardship Transition
ID IGF 2016 - Opening - IANA Stewardship Transition
 
Tomasz Czajkowski
Tomasz CzajkowskiTomasz Czajkowski
Tomasz Czajkowski
 
Digitisation, democracy and the regulation of personal data use for political...
Digitisation, democracy and the regulation of personal data use for political...Digitisation, democracy and the regulation of personal data use for political...
Digitisation, democracy and the regulation of personal data use for political...
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet freedom: a comparative assessment
Internet freedom: a comparative assessmentInternet freedom: a comparative assessment
Internet freedom: a comparative assessment
 
Systemic cybersecurity risk
Systemic cybersecurity riskSystemic cybersecurity risk
Systemic cybersecurity risk
 
How Estonia is helping to shape cyber resilience
How Estonia is helping to shape cyber resilienceHow Estonia is helping to shape cyber resilience
How Estonia is helping to shape cyber resilience
 

Andere mochten auch (8)

Cyber Crime Investigation
Cyber Crime InvestigationCyber Crime Investigation
Cyber Crime Investigation
 
The Evolving Computer Fraud and Abuse Act
The Evolving Computer Fraud and Abuse ActThe Evolving Computer Fraud and Abuse Act
The Evolving Computer Fraud and Abuse Act
 
Computer forensics law and privacy
Computer forensics   law and privacyComputer forensics   law and privacy
Computer forensics law and privacy
 
Computer And The Law
Computer And The LawComputer And The Law
Computer And The Law
 
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAINCOMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
 
Sql Server 2012
Sql Server 2012Sql Server 2012
Sql Server 2012
 
Sources of international law
Sources of international lawSources of international law
Sources of international law
 
288 33 powerpoint-slides_chapter-8-political-legal-environment
288 33 powerpoint-slides_chapter-8-political-legal-environment288 33 powerpoint-slides_chapter-8-political-legal-environment
288 33 powerpoint-slides_chapter-8-political-legal-environment
 

Ähnlich wie Application of principles of international law to computer networks operations management

Cyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri LankaCyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri Lanka
Evan Pathiratne
 
CTO Cybersecurity Forum 2013 Mario Maniewicz
CTO Cybersecurity Forum 2013 Mario ManiewiczCTO Cybersecurity Forum 2013 Mario Maniewicz
CTO Cybersecurity Forum 2013 Mario Maniewicz
Commonwealth Telecommunications Organisation
 
Francesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityFrancesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber security
Andrea Rossetti
 
An Exploratory Study on Mechanisms in Place to Combat Hacking In South Africa...
An Exploratory Study on Mechanisms in Place to Combat Hacking In South Africa...An Exploratory Study on Mechanisms in Place to Combat Hacking In South Africa...
An Exploratory Study on Mechanisms in Place to Combat Hacking In South Africa...
AJHSSR Journal
 
CTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard SimpsonCTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard Simpson
segughana
 

Ähnlich wie Application of principles of international law to computer networks operations management (20)

The National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationThe National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through Cooperation
 
Electronic Surveillance of Communications 100225
Electronic Surveillance of Communications 100225Electronic Surveillance of Communications 100225
Electronic Surveillance of Communications 100225
 
Electronic Surveillance Of Communications 100225
Electronic Surveillance Of Communications 100225Electronic Surveillance Of Communications 100225
Electronic Surveillance Of Communications 100225
 
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIAHISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
 
Cyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri LankaCyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri Lanka
 
Russia and cybercrime
Russia and cybercrimeRussia and cybercrime
Russia and cybercrime
 
Cyber Security Intelligence
Cyber Security IntelligenceCyber Security Intelligence
Cyber Security Intelligence
 
CTO Cybersecurity Forum 2013 Mario Maniewicz
CTO Cybersecurity Forum 2013 Mario ManiewiczCTO Cybersecurity Forum 2013 Mario Maniewicz
CTO Cybersecurity Forum 2013 Mario Maniewicz
 
Cyber Security Cooperation
Cyber Security CooperationCyber Security Cooperation
Cyber Security Cooperation
 
Cyber Crime & Cyber Security Workshop, ZIE
Cyber Crime & Cyber Security Workshop, ZIE Cyber Crime & Cyber Security Workshop, ZIE
Cyber Crime & Cyber Security Workshop, ZIE
 
Framework of responsible state behaviour in cyberspace - for Marshall Center ...
Framework of responsible state behaviour in cyberspace - for Marshall Center ...Framework of responsible state behaviour in cyberspace - for Marshall Center ...
Framework of responsible state behaviour in cyberspace - for Marshall Center ...
 
Francesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityFrancesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber security
 
Cyber
CyberCyber
Cyber
 
Cyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responsesCyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responses
 
Critical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challengesCritical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challenges
 
An Exploratory Study on Mechanisms in Place to Combat Hacking In South Africa...
An Exploratory Study on Mechanisms in Place to Combat Hacking In South Africa...An Exploratory Study on Mechanisms in Place to Combat Hacking In South Africa...
An Exploratory Study on Mechanisms in Place to Combat Hacking In South Africa...
 
C3i Group Cyber Law
C3i Group Cyber LawC3i Group Cyber Law
C3i Group Cyber Law
 
Addressing Cybersecurity and Cybercrime via a co-evolutionary approach to red...
Addressing Cybersecurity and Cybercrime via a co-evolutionary approach to red...Addressing Cybersecurity and Cybercrime via a co-evolutionary approach to red...
Addressing Cybersecurity and Cybercrime via a co-evolutionary approach to red...
 
Managing High-Volume Cyber Attacks Through Effective Strategies in Indonesia
Managing High-Volume Cyber Attacks Through Effective Strategies in IndonesiaManaging High-Volume Cyber Attacks Through Effective Strategies in Indonesia
Managing High-Volume Cyber Attacks Through Effective Strategies in Indonesia
 
CTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard SimpsonCTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard Simpson
 

Kürzlich hochgeladen

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Kürzlich hochgeladen (20)

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 

Application of principles of international law to computer networks operations management

  • 1. Application of principles of international law to computer network operations management Adriana Dvoršak 1st international academic conference on intelligence and security Contemporary Intelligence Support Systems. 
  • 2. 1. Security of IP (concern of the IETF). 2. Security of networks (focus on CERT). 3. Security of business. 4. The individual's human rights (privacy) 5. National security (state sovereignty, national interests, cyber warfare). (Doria, 2007) Providing security to individuals, business, state. Concepts of cyber security
  • 3. and law of armed conflict: 1. military necessity, 2. distinction, 3. proportionality, 4. perfidy, 5. neutrality, and 6. unnecessary suffering. Principles of international law
  • 5. CNO in operation Allied force CNE - NATO, Serbia CNA – NATO CND – US (?) Propaganda - Serbia Military deception - Serbia Learning points for NATO Vulnerabilities National decision making processes State practice from the region
  • 6. Offensive doctrine Military foreign policy options are expanded Small states with offensive foreign policy Can Slovenia advocate cyber offensive? Article 124 of Constitution: In the provision of security the state proceeds principally from a policy of peace, and an ethic of peace and non-aggression. Legal conditions for CNA Right for self-defense Part of general and information warfare Request from UNSC Coalitions of the willing supported by UN Resolution Cyber offensive
  • 7. CNA CND TARGET IW AREAS TACTICS TACTICS WEAPONS ATTRIBUTES CONSEQUENCES REACTIONS perceptions,actions RECOVERY DECISION CONTEXT CONSIDERATIONS FOR IW PLANNING 1 Legal,political,social 2 Skil levels, technical 3 Financial reevaluation CNO lifecycle model Adapted from van Niekerk, 2011
  • 8. The self-defence rule: Everyone has the right to self-defence. The cooperation rule: The fact that a CNA has been conducted via information systems located in a state’s territory creates a duty to cooperate with the victim state. The access to information rule: The public has a right to be informed about threats to their life, security and well-being. The mandate rule: An organisation’s capacity to act (and regulate) derives from its mandate. The data protection rule: Information relating to an identified or identifiable natural person is regarded as personal data. (Tikk, 2011) NATO 10 rules
  • 9. The territoriality rule: Information infrastructure located within a state’s territory is subject to that state’s territorial sovereignty. The responsibility rule: Fact that CNA was launched from inf.system located in a state’s territory is evidence that the act is attributable to that state. The duty of care rule: Everyone has the responsibility to implement a reasonable level of security in their information infrastructure. The early warning rule: There is an obligation to notify potential victims about known, upcoming cyber attacks. The criminality rule: Every nation has the responsibility to include the most common cyber offences in its substantive criminal law. NATO 10 rules
  • 10. Member States required to have: • national network and information security (NIS) strategy; • NIS cooperation plan; • NIS competent national authority: – technical expertise, – international liasion, – security breach reporting, – CERT functions. • Computer Emergency Response Team (CERT). EU Directive on common level of NIS
  • 11. Obligatory breach notification to the competent authority, it determines which notification is in the public interest (security intelligence?). Competent authority requires market operators and public administrations to: – provide information needed to assess the security of their NIS; – undergo a security audit and make the results available to the competent authority; – issues binding instructions to market operators and public administrations. (Articles 14 and 15) EU Directive – competent authority
  • 12. Difference Proposal for a Directive on network and info security vs Cyber Security Strategy Cyberdefence policy and capabilities related to Common Security and Defence Policy (CSDP) Aims: – To concentrate on cyberdefence capability on detection, response and recovery from sophisticated cyber threats; – synergies between civilian and military approaches. Cyber Security Strategy and CSDP
  • 13. High Representative, MS, EDA will assess capability development: doctrine, leadership, organisation, personnel, training, technology, infrastructure, logistics and interoperability. Develop EU cyberdefence policy: missions and operations, dynamic risk management, improved threat analysis, information sharing, training and exercise for militaries in the EU and multinational context. Promote dialogue and coordination – civilian and military actors in the EU, – international partners, NATO, international organisations. High Representative activities
  • 14. National cyber security and cyber defense strategy. Analysis of external environment Pressure - normative dimension (EU Directive obligations, NATO minimum requirements); Threats. Internal environment Changes to legal framework (information society, criminal code, privacy). Stakeholders (military, police, academia, civil society, business). Synergies between national cyber incident capabilities, CERT, and competent authority (EU Directive on network and info security) Way ahead for Slovenia
  • 15. Centre vs. Periphery Global North - Global South relations Balkanization of CNE 1981 UNGA Declaration on Non-intervention: “the right of states and peoples to have free access to information and to develop fully, without interference, their system of information and mass media, and to use their information media in order to promote their political, social, economic, and cultural interests and aspirations.” Certain CNE amount to an unlawful intervention, e.g. cyber propaganda activities aimed at fomenting civil upraising in a target state, interference with elections. Non-intervention
  • 16. National assesement Synergies between national needs and international requirements EU Directive NATO requirements New institutions Conclusions
  • 17. Appendix Constitution of International Telecommunications Union (1992). Doria, A. (2007). What do the Words »Internet Security« Mean? In Kleinwoechter (Ed.), The Power of Ideas: Internet Governance in a Global Multi-Stakeholder Environment. Berlin Kanuck, S. (2009). Sovereign Discourse on Cyber Conflict under International Law. Texas Law Review, 88. van Niekerk, B., & Maharaj, M. S. (2011). The Information Warfare Life Cycle Model. SA Journal of Information Management, Vol 13, No1 European Commission. (2013a). Cyber Security Strategy of the European Union: An Open, Safe and Secure Cyberspace. Retrieved from http://ec.europa.eu/digital-agenda/en/news/eu-cybersecurity- plan-protect-open-internet-and-online-freedom-and-opportunity-cyber-security. European Commission. (2013b). Proposal for a Directive of the European Parliament and of the Council concerning measures to ensure a high common level of network and information security across the Union. (COM(2013) 48). Retrieved from http://ec.europa.eu/digital-agenda/en/news/eu- cybersecurity-plan-protect-open-internet-and-online-freedom-and-opportunity-cyber-security. Tikk, E. (2011). Ten Rules for Cyber Security. Survival: Global Politics and Strategy, 53(3).