Link[1] Why a cybersecurity treaty is a pipe dream
Citerend uit: Adam Segal, Matthew Waxman Geciteerd door: David Price 6:01 PM 1 November 2011 GMT
Citerank: (12) 121697Blogs, Articles, ReportsSuggest / cite other blogs, articles, reports about the conference that you would like to see included in the map here.609FDDBE, 123204Bleak prospects for a global, comprehensive cybersecurity treaty959C6EF, 123212Different interests will pull the parties apartDifferent interests among powerful states – stemming from different strategic priorities, internal politics, public-private relationships and vulnerabilities – will continue to pull them apart on how cyberspace should be used, regulated, and secured.1198CE71, 123215Should the laws of war and self-defence apply to cyber attacksShould the international laws of war and self-defence apply to cyber attacks?8FFB597, 123216Do states have a right to block information from citizens?8FFB597, 123217What roles (if any) should private actors play in Internet governance?What roles (if any) should private actors in Internet governance?8FFB597, 123220Defining cybersecurity8FFB597, 123221Protection of computer networks from damage and theftThe United States, United Kingdom and their like-minded allies emphasize the protection of computer networks from damage and theft when defining cybersecurity.959C6EF, 123222Information securityRussia, China and their partners emphasize information security when defining cybersecurity, which to them means controlling content and communication or social networking tools that may threaten regime stability.959C6EF, 123231Joint policy declarations with allies959C6EF, 123232Accept that legal gray zones will remain959C6EF, 123234Cultivate technical partnerships with developing states959C6EF URL:
|
Fragment- Dialogue with China, Russia and others should focus not on reaching legal agreement but on communicating redlines and developing confidence-building measures, recognizing that it may be difficult to determine immediately the source of attacks. States should be willing to exchange ideas about the offensive and defensive use of cyber-weapons as well as how to develop points of contact and hotlines that can be used in the midst of a cyber crisis. |