Cyber Warfare and International Humanitarian Law / (Record no. 45411)

000 -LEADER
fixed length control field 09786nam a22002177a 4500
003 - CONTROL NUMBER IDENTIFIER
control field VITAP
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20230624091603.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 230624b ||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9788194808008
040 ## - CATALOGING SOURCE
Transcribing agency VITAP
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Edition number 23rd
Classification number 343.0999 KAM
100 ## - MAIN ENTRY--PERSONAL NAME
9 (RLIN) 12788
Personal name Kammila, Aruna
245 ## - TITLE STATEMENT
Title Cyber Warfare and International Humanitarian Law /
Statement of responsibility, etc. Aruna Kammila
250 ## - EDITION STATEMENT
Edition statement 1st Ed. Reprinted 2022
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Allahabad
Name of publisher, distributor, etc. Central Law Publications
Date of publication, distribution, etc. 2020
300 ## - PHYSICAL DESCRIPTION
Extent xvi, 196p. : ill. ; 23cm
521 ## - TARGET AUDIENCE NOTE
Target audience note It includes Foreword, Preface, Acknowledgements, Contents, Introduction, Chapters, Conclusions and Suggestions and Bibliography pages etc.<br/><br/>Characterization:<br/>Contents<br/><br/>CHAPTER I<br/><br/>INTRODUCTION<br/><br/> <br/><br/>CHAPTER II<br/><br/>WARFARE-TECHNOLOGY-INTERFACE<br/><br/>2.1. Evolution of Warfare<br/><br/>2.1.1. First Generation Warfare<br/><br/>2.1.2. Second Generation Warfare<br/><br/>2.1.3. Third Generation Warfare<br/><br/>2.1.4. Fourth Generation Warfare<br/><br/> 2.1.4.1. Changing actors on the battlefield<br/><br/> 2.1.4.2. The Emergence of Cyber Warfare as the<br/><br/> Fourth Generation Warfare<br/><br/> 2.1.4.3. The ambiguity of line between war,<br/><br/> peacetime and unidentified victory conditions <br/><br/>2.2. Law of War<br/><br/> 2.2.1. The History of International Humanitarian Law<br/><br/>2.3. History of the Internet<br/><br/>2.4. Today’s Internet<br/><br/>2.5. Actors in Cyberspace<br/><br/> 2.5.1. Netizens<br/><br/> 2.5.2. Script kiddies<br/><br/> 2.5.3. Hackers<br/><br/> (a) The white hat hackers<br/><br/> (b) The black hat hackers<br/><br/> (c) The grey hat hackers<br/><br/> 2.5.4. Hacktivists<br/><br/> 2.5.5. Patriot hackers<br/><br/> 2.5.6. Cyber Insiders<br/><br/> 2.5.7. Cyber Terrorists<br/><br/> 2.5.8. Malware authors<br/><br/> 2.5.9. Cyber Scammers<br/><br/> 2.5.10. Organized Cybercriminals<br/><br/> 2.5.11. Corporations<br/><br/> 2.5.12. Cyber espionage agents<br/><br/> 2.5.13. Cybermilitia<br/><br/>2.6. Arsenal of Cyber Warrior<br/><br/>2.7. The Nexus Between Cyber Warfare and International<br/><br/> Humanitarian Law<br/><br/>CHAPTER 3<br/><br/>CYBER WARFARE-CONCEPTUAL ANALYSIS<br/><br/>3.1. Analysis Of Different Cyber Terminologies In Cognition of the Concept<br/><br/> 3.1.1. Cyberspace<br/><br/> 3.1.2. Cyber Operations<br/><br/> 3.1.3. Information Warfare<br/><br/> 3.1.4. Cyber War<br/><br/> 3.1.5. Cyber Warfare<br/><br/> 3.1.6. Cyber-Crime <br/><br/> 3.1.6.1. Hacking<br/><br/> 3.1.6.2. Computer Viruses<br/><br/> 3.1.6.3. Phishing<br/><br/> 3.1.6.4. Spoofing<br/><br/> 3.1.6.5. Phone Phishing<br/><br/> 3.1.6.6. Internet Pharming<br/><br/> 3.1.6.7. Publishing Pornographic Material In Electronic Form<br/><br/> 3.1.6.8. Investment Newsletter<br/><br/> 3.1.6.9. Credit Card Fraud<br/><br/> 3.1.7. Cyber-attack<br/><br/> 3.1.7.1. Shanghai Cooperation Organisation<br/><br/> 3.1.7.2. Council of Europe's Convention on Cybercrime<br/><br/> 3.1.7.3. US Army's DCSIN7 Handbook No. 1.02<br/><br/> 3.1.7.4. Definition by M. Rossini<br/><br/> 3.1.7.5. Definition in Tallinn Manual <br/><br/> 3.1.7.6. Definition bv Oona Hathaway<br/><br/> 3.1.7.7. The Recommended Definition<br/><br/>(a) Intent<br/><br/>(b) Motive<br/><br/>(c) Actors<br/><br/>(d) Means and methods<br/><br/>(e) Target<br/><br/>(f) Effects<br/><br/>3.2. The Comparison of Cyber-Attack, Cyber-Crime, and Cyber-Warfare<br/><br/>3.3. Cyber Operations and Incidents<br/><br/> 3.3.1. Cyber-attack by the United States America<br/><br/> 3.3.2. Russia and Chechnya<br/><br/> 3.3.3. Kosovo and the U.S.A<br/><br/> 3.3.4. Israel and Palestine<br/><br/> 3.3.5. Estonia and Russia<br/><br/> 3.3.6. Israel and Syria<br/><br/> 3.3.7. Lithuania<br/><br/> 3.3.8. Russia and Georgia<br/><br/> 3.3.9. Russia and Kyrgystan<br/><br/> 3.3.10. South Korea and the U.S.A<br/><br/> 3.3.11. Iran<br/><br/> 3.3.12. Myanmar<br/><br/> 3.3.13. Operation Israel (Oplsrael)<br/><br/> 3.3.14. Singapore<br/><br/> 3.3.15. Operation Shady Rat<br/><br/> 3.3.16. Red October malware<br/><br/> 3.3.17. Wanna cry Ransomware attack<br/><br/> 3.3.18. Attack on Yahoo<br/><br/> <br/><br/>CHAPTER 4<br/><br/>USE OF FORCE AND CYBER ATTACKS<br/><br/>4.1. Principles or Norms to be followed during the Use of Force .<br/><br/> 4.1.1. Jus in Bello<br/><br/> 4.1.2. Jus ad Bellum<br/><br/>4.2. Prohibition on the use of force<br/><br/>4.2.1. Interpretation and the Scope of Article 2(4)<br/><br/>4.2.2. Crossing the threshold of use of force<br/><br/>4.2.3. Application by Analogy?<br/><br/>4.2.4. Leading Approaches<br/><br/>4.2.4.1. Instrument-Based Approach<br/><br/>4.2.4.2. Target-Based Approach<br/><br/>4.2.4.3. Effects-Based Approach<br/><br/>4.2.4.4. Normative Framework by Schmitt<br/><br/>4.2.4.5. Cyber-Physical Systems-Based Approach<br/><br/>4.2.4.6. The Approach by Noah Simmons<br/><br/>4.2.4.7. Tallinn Manual Approach<br/><br/>4.2.4.8. International Committee of Red Cross<br/><br/>4.2.4.9. Other Approaches<br/><br/>4.3. An Expedition through the Present to the Future<br/><br/><br/>CHAPTER 5<br/><br/>USE OF FORCE - EXCEPTIONS<br/><br/>5.1. Technological Concerns with Cyber Crimes<br/><br/>5.1.1. Intrusion<br/><br/>5.1.2. Denial of Service<br/><br/>5.2. Effects of Cyber Attack on Victims vis-a-vis Right of<br/><br/>Self Defence<br/><br/>5.2.1. Revenge on Estonia<br/><br/>5.2.2. Stuxnet the Game Changer<br/><br/>5.2.3. The Moonlight Maze<br/><br/>5.2.4. Lockheed Martin’s<br/><br/>5.2.5. Compromise with US Military Security<br/><br/>5.3. Issues with Exercise of Right of Self Defence<br/><br/>5.3.1. Cyber Attack As An Armed Attack<br/><br/>5.3.1.1. Attribution<br/><br/>5.3.1.2. Jurisdiction<br/><br/>5.3.2. Use of Force in Self Defence<br/><br/>5.3.2.1. Necessity<br/><br/>5.3.2.2. Proportionality<br/><br/>5.3.2.3. Immediacy<br/><br/>5.3.2.4. Imminence<br/><br/>5.4. Anticipatory Self-defence/Pre-emptive/Preventive defence<br/><br/>5.5. Neutrality<br/><br/>5.6. Distinction<br/><br/>5.7. Counter Measures Other Than Use Of Force<br/><br/>5.8. Self-defence Vis A Vis Tallinn Manual<br/><br/>5.9. Other Legal Framework<br/><br/>5.9.1. Jus in Bello<br/><br/>5.9.2. Countermeasures<br/><br/>5.10. Legal Regimes That Directly Deal With Cyber Attacks<br/><br/>5.10.1. United Nations<br/><br/>5.10.2. North Atlantic Treaty Organisation<br/><br/>5.10.3. The Council of Europe<br/><br/>5.10.3. The Organisation of American States<br/><br/>5.10.4. Shanghai Cooperation Organisation<br/><br/>5.11. Legal Regimes That Deal Indirectly With Cyber Attacks<br/><br/>5.11.1. Law of Space<br/><br/>5.11.2. Law of seas<br/><br/>5.11.3. Telecommunications Law<br/><br/>5.11.4. Aviation Law<br/><br/>5.11.5. Treaty Law<br/><br/> <br/><br/>CHAPTER 6<br/><br/>CYBER SECURITY POLICIES AND CYBER WARFARE - A CRITICAL ANALYSIS <br/><br/>6.1. Cyber Security: Indian Perspective<br/><br/>6.1.1. Cyber Security Policy-Need of the hour<br/><br/>6.1.2. Cyber Security Policy of India, 2013 & Countermeasure Framework <br/><br/>6.2. Cyber Warfare and Security- The Russian Perspective<br/><br/>6.2.1. Agencies and Organizations<br/><br/>6.2.2. Role of Hackers and Criminals in Russian Cyber Space Regime<br/><br/>6.2.3. Cyber uses in the generation of Kinetic Effects- Current Regime<br/><br/>6.2.4. The Cyber role in the Russian Propaganda<br/><br/>6.3. Cyber Security Policy: The United States Perspective<br/><br/>6.3.1. Strategic National Cyber Security Objective<br/><br/>6.3.2. Protecting Critical Infrastructure<br/><br/>6.4. Cyber Security Policy: The Chinese Perspective<br/><br/>6.4.1. Cyber Security Law of People’s Republic of China<br/><br/>6.4.1.1. Data Localization<br/><br/>6.4.1.2. Handling of Personal Information<br/><br/>6.4.1.3. Transfer of Personal Information<br/><br/>6.4.1.4. Identity Verification of Internet Users and<br/><br/>Protection of Minors<br/><br/>6.4.1.5. Draft Measures to expand Data Localization<br/><br/>and Cross-Border Transfer Requirements<br/><br/>6.5. Cyber Deterrence<br/><br/>6.5.1. Principles of Cyber Deterrence<br/><br/>6.5.1.1. Deterrence by Punishment<br/><br/>6.5.1.1.1. Conditions of successful Deterrence by Punishment<br/><br/>6.5.1.1.1.1. The credibility of the threat<br/><br/>6.5.1.1.1.2. Capability to display and use of force<br/><br/>6.5.1.1.1.3. Communication of the threat<br/><br/>6.5.1.2. Deterrence by Denial<br/><br/>6.5.2. Challenges to implement deterrence in cyberspace<br/><br/>6.5.2.1. Anonymity<br/><br/>6.5.2.2. Asymmetry<br/><br/>6.5.2.3. Super-Empowerment<br/><br/>6.5.2.4. Temporality<br/><br/>6.5.2.5. Scalability<br/><br/>6.5.3. Applying the existing law on armed conflict to cyber-warfare<br/><br/>6.5.4. Recommendations for successful implementation of the theory of deterrence<br/><br/> in cyberspace<br/><br/> <br/><br/>CHAPTER 7<br/><br/>CONCLUSION AND SUGGESTIONS<br/>
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
9 (RLIN) 12789
Topical term or geographic name entry element War (International law); Cyberterrorism; Information warfare (International law)
856 ## - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://www.clplawbooks.com/book_detail/634#specifications">https://www.clplawbooks.com/book_detail/634#specifications</a>
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Koha item type Reference Book
Edition 23rd
Classification part 343.0999
Call number suffix KAM
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Materials specified (bound volume or other part) Damaged status Not for loan Permanent Location Current Location Shelving location Date acquired Source of acquisition Cost, normal purchase price Inventory number Total Checkouts Full call number Barcode Date last seen Date last checked out Copy number Cost, replacement price Price effective from Koha item type Public note
      Paper Back     VIT AP School of Law VIT AP School of Law LAW Section 2023-04-21 Deccan Law House 250.00 4010 1 343.0999 KAM 020763 2023-11-28 2023-11-25 LA01911 250.00 2023-06-24 Text Book LAW

Visitor Number:

Powered by Koha