全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

Cyber Warfare: Strategies, Impacts, and Future Directions in the Digital Battlefield

DOI: 10.4236/jis.2025.162013, PP. 252-269

Keywords: Cyber Warfare, Cyber Threats, Digital Resilience, Regulatory Challenges, International Cooperation

Full-Text   Cite this paper   Add to My Lib

Abstract:

Cyber warfare has evolved to become a key consideration when it comes to global security and international relations. This paper highlights how cyber warfare has evolved as a threat and explores its various forms. From offensive to defensive cyber operations, different actors are involved in cyber warfare, each operation having a different motive. Both state and non-state actors can initiate cyber warfare, resulting in far-reaching impacts on economies, societies, and national security. Being a relatively new area, it is challenging to apply existing international laws to cyber warfare. Ethics are also not adequately defined in cyber warfare. Moreover, emerging technologies such as artificial intelligence and quantum computing are set to have an impact on cyber warfare moving into the future, with the potential to accelerate both offensive and defensive capabilities. This paper emphasizes the growing importance of establishing legal and ethical guidelines to guide cyber warfare, similar to those that currently guide traditional warfare. It emerges that cyber warfare is a key part of modern warfare, and its use will only increase. As its use continues to increase, the potential impacts of cyber warfare are also expanding since the world is increasingly relying on digital systems. This paper recommends that all exposed parties seek to understand cyber warfare’s tactics, motivations, and impacts and use that understanding to guide how to approach the matter.

References

[1]  Shaheen, S. (2013) Offense-Defense Balance in Cyber Warfare. In: Kremer, J.F. and Müller, B., Eds., Cyberspace and International Relations, Springer, 77-93.
https://doi.org/10.1007/978-3-642-37481-4_5
[2]  Porche III, I.R. (2019) Cyberwarfare: An Introduction to Information-Age Conflict. Artech House.
[3]  Collins, S. and McCombie, S. (2012) Stuxnet: The Emergence of a New Cyber Weapon and Its Implications. Journal of Policing, Intelligence and Counter Terrorism, 7, 80-91.
https://doi.org/10.1080/18335330.2012.653198
[4]  Kushner, D. (2013) The Real Story of Stuxnet. IEEE Spectrum, 50, 48-53.
https://doi.org/10.1109/mspec.2013.6471059
[5]  Farwell, J.P. and Rohozinski, R. (2011) Stuxnet and the Future of Cyber War. Survival, 53, 23-40.
https://doi.org/10.1080/00396338.2011.555586
[6]  Alkhadra, R., Abuzaid, J., AlShammari, M. and Mohammad, N. (2021) Solar Winds Hack: In-Depth Analysis and Countermeasures. 2021 12th International Conference on Computing Communication and Networking Technologies (ICCCNT), Kharagpur, 6-8 July 2021, 1-7.
https://doi.org/10.1109/icccnt51525.2021.9579611
[7]  O’Connor, Sarah, Hanson, F., Currey, E. and Beattie, T. (2020) Cyber-Enabled Foreign Interference in Elections and Referendums. Vol. 28, Australian Strategic Policy Institute.
[8]  Goode, L. (2018) Anonymous and the Political Ethos of Hacktivism. In: Schwarz, J.A. and Burkart, P., Eds., Popular Communication, Piracy and Social Change, Routledge, 99-112.
[9]  Sorell, T. (2015) Human Rights and Hacktivism: The Cases of Wikileaks and Anonymous. Journal of Human Rights Practice, 7, 391-410.
https://doi.org/10.1093/jhuman/huv012
[10]  Brunst, P.W. (2009) Terrorism and the Internet: New Threats Posed by Cyberterrorism and Terrorist Use of the Internet. In: Wade, M. and Maljevic, A., Eds., A War on Terror? Springer, 51-78.
https://doi.org/10.1007/978-0-387-89291-7_3
[11]  Rahimi, N. and Gupta, B. (2020) A Study of the Landscape of Internet Censorship and Anti-Censorship in Middle East. Proceedings of 35th International Conference on Computers and Their Applications, 69, 60-68.
https://doi.org/10.29007/vpbg
[12]  Maurer, T. (2017) Cyber Mercenaries. Cambridge University Press.
https://doi.org/10.1017/9781316422724
[13]  Hobbs, Allegra. (2021) The Colonial Pipeline Hack: Exposing Vulnerabilities in U.S. Cybersecurity. SAGE Publications: SAGE Business Cases Originals.
[14]  Pattison, J. (2014) The Morality of Private War: The Challenge of Private Military and Security Companies. Oxford University Press.
https://doi.org/10.1093/acprof:oso/9780199639700.001.0001
[15]  Policy, Twitter Public (2017) Update: Russian interference in the 2016 US Presidential Election. Twitter Blog.
[16]  Xiao, A. (2019) Responding to Election Meddling in the Cyberspace: An International Law Case Study on the Russian Interference IN the 2016 Presidential Election. Duke Journal of Comparative & International Law, 30, 349-378.
[17]  Chen, Q. and Bridges, R.A. (2017) Automated Behavioral Analysis of Malware: A Case Study of WannaCry Ransomware. 2017 16th IEEE International Conference on Machine Learning and Applications (ICMLA), Cancun, 18-21 December 2017, 454-460.
https://doi.org/10.1109/icmla.2017.0-119
[18]  Fayi, S.Y.A. (2018) What Petya/NotPetya Ransomware Is and What Its Remidiations Are. In: Information TechnologyNew Generations, Springer International Publishing, 93-100.
https://doi.org/10.1007/978-3-319-77028-4_15
[19]  Gandhi, R., Sharma, A., Mahoney, W., Sousan, W., Zhu, Q.M. and Laplante, P. (2011) Dimensions of Cyber-Attacks: Cultural, Social, Economic, and Political. IEEE Technology and Society Magazine, 30, 28-38.
https://doi.org/10.1109/mts.2011.940293
[20]  Darraj, Emily, Sample, C. and Cowley, J. (2017) Information Operations: The Use of Information Weapons in the 2016 US Presidential Election. Proceedings of the 16th European Conference on Cyber Warfare and Security, Dublin, 92-101.
[21]  Kristin, F., Michelle, D., Fischer, E.A., Lawrence, S.V. and Theohary, C.A. (2015) Cyber Intrusion into US Office of Personnel Management: In Brief. Congressional Research Service.
[22]  Bellovin, S.M., Landau, S. and Lin, H.S. (2016) Limiting the Undesired Impact of Cyber Weapons: Technical Requirements and Policy Implications. Journal of Cybersecurity, 3, 59-68.
[23]  Lilienthal, G. and Ahmad, N. (2015) Cyber-Attack as Inevitable Kinetic War. Computer Law & Security Review, 31, 390-400.
https://doi.org/10.1016/j.clsr.2015.03.002
[24]  Myauo, M. (2016) The U.S. Department of Defense Cyber Strategy: A Call to Action for Partnership. Georgetown Journal of International Affairs, 17, 21-29.
https://doi.org/10.1353/gia.2016.0033
[25]  Costello, J. and McReynolds, J. (2018) China’s Strategic Support Force: A Force for a New Era.
[26]  Van De Velde, J. (2017) The Law of Cyber Interference in Elections.
https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3043828
[27]  Steed, D. (2015) The Strategic Implications of Cyber Warfare 1. In: Green, J.A., Ed., Cyber Warfare, Routledge, 73-95.
https://doi.org/10.4324/9781315761565-5
[28]  Radanliev, P. (2024) Cyber diplomacy: Defining the Opportunities for Cybersecurity and Risks from Artificial Intelligence, IoT, Blockchains, and Quantum Computing. Journal of Cyber Security Technology, 1-51.
[29]  Charter, U.N. (1945) Charter of the United Nations. 59.
[30]  Yingling, R.T. and Ginnane, R.W. (1952) The Geneva Conventions of 1949. American Journal of International Law, 46, 393-427.
https://doi.org/10.2307/2194498
[31]  Jensen, E.T. (2016) The Tallinn Manual 2.0: Highlights and Insights. Georgetown Journal of International Law, 4, 735-778.
[32]  Shrivastava, A. and Lakra, R. (2022) Revisiting Due Diligence in Cyberspace: Crafting International Law’s Arsenal against Transboundary Botnets. International Journal of Law and Information Technology, 30, 321-349.
https://doi.org/10.1093/ijlit/eaac021
[33]  Stroppa, M. (2023) Legal and Ethical Implications of Autonomous Cyber Capabilities: A Call for Retaining Human Control in Cyberspace. Ethics and Information Technology, 25, Article No. 7.
https://doi.org/10.1007/s10676-023-09679-w
[34]  Newton, M. and Larry, M. (2014) Proportionality in International Law. Oxford University Press.
[35]  Hallaq, Bilal, Somer, Tiia, Osula, Anna-Maria, Ngo, Kim and Timothy, M.-N. (2017) Artificial Intelligence within the Military Domain and Cyber Warfare. 16th European Conference on Cyber Warfare and Security (ECCWS 2017), Dublin, 29-30 June 2017, 153-157.
[36]  Lear, S. (2017) The Fight Over Encryption: Reasons Why Congress Must Block the Government from Compelling Technology Companies to Create Backdoors into Their Devices. Cleveland State Law Review, 66, Article 443.
[37]  Covington, M.J. and Rush, C. (2013) Threat Implications of the Internet of Things. In: Podins, K., Stinissen, J. and Maybaum, M., Eds., 2013 5th International Conference on Cyber Conflict (CYCON 2013), NATO CCD COE Publications, 1-12.
[38]  Attatfa, A., Renaud, K. and De Paoli, S. (2020) Cyber Diplomacy: A Systematic Literature Review. Procedia Computer Science, 176, 60-69.
https://doi.org/10.1016/j.procs.2020.08.007
[39]  Body, N.S. (2021) The Evolution of the UN Group of Governmental Experts on Cyber Issues. New Conditions and Constellations in Cyber, 15.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133