000 -LEADER |
fixed length control field |
09786nam a22002177a 4500 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
VITAP |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20230624091603.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
230624b ||||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9788194808008 |
040 ## - CATALOGING SOURCE |
Transcribing agency |
VITAP |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER |
Edition number |
23rd |
Classification number |
343.0999 KAM |
100 ## - MAIN ENTRY--PERSONAL NAME |
9 (RLIN) |
12788 |
Personal name |
Kammila, Aruna |
245 ## - TITLE STATEMENT |
Title |
Cyber Warfare and International Humanitarian Law / |
Statement of responsibility, etc. |
Aruna Kammila |
250 ## - EDITION STATEMENT |
Edition statement |
1st Ed. Reprinted 2022 |
260 ## - PUBLICATION, DISTRIBUTION, ETC. |
Place of publication, distribution, etc. |
Allahabad |
Name of publisher, distributor, etc. |
Central Law Publications |
Date of publication, distribution, etc. |
2020 |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xvi, 196p. : ill. ; 23cm |
521 ## - TARGET AUDIENCE NOTE |
Target audience note |
It includes Foreword, Preface, Acknowledgements, Contents, Introduction, Chapters, Conclusions and Suggestions and Bibliography pages etc.<br/><br/>Characterization:<br/>Contents<br/><br/>CHAPTER I<br/><br/>INTRODUCTION<br/><br/> <br/><br/>CHAPTER II<br/><br/>WARFARE-TECHNOLOGY-INTERFACE<br/><br/>2.1. Evolution of Warfare<br/><br/>2.1.1. First Generation Warfare<br/><br/>2.1.2. Second Generation Warfare<br/><br/>2.1.3. Third Generation Warfare<br/><br/>2.1.4. Fourth Generation Warfare<br/><br/> 2.1.4.1. Changing actors on the battlefield<br/><br/> 2.1.4.2. The Emergence of Cyber Warfare as the<br/><br/> Fourth Generation Warfare<br/><br/> 2.1.4.3. The ambiguity of line between war,<br/><br/> peacetime and unidentified victory conditions <br/><br/>2.2. Law of War<br/><br/> 2.2.1. The History of International Humanitarian Law<br/><br/>2.3. History of the Internet<br/><br/>2.4. Today’s Internet<br/><br/>2.5. Actors in Cyberspace<br/><br/> 2.5.1. Netizens<br/><br/> 2.5.2. Script kiddies<br/><br/> 2.5.3. Hackers<br/><br/> (a) The white hat hackers<br/><br/> (b) The black hat hackers<br/><br/> (c) The grey hat hackers<br/><br/> 2.5.4. Hacktivists<br/><br/> 2.5.5. Patriot hackers<br/><br/> 2.5.6. Cyber Insiders<br/><br/> 2.5.7. Cyber Terrorists<br/><br/> 2.5.8. Malware authors<br/><br/> 2.5.9. Cyber Scammers<br/><br/> 2.5.10. Organized Cybercriminals<br/><br/> 2.5.11. Corporations<br/><br/> 2.5.12. Cyber espionage agents<br/><br/> 2.5.13. Cybermilitia<br/><br/>2.6. Arsenal of Cyber Warrior<br/><br/>2.7. The Nexus Between Cyber Warfare and International<br/><br/> Humanitarian Law<br/><br/>CHAPTER 3<br/><br/>CYBER WARFARE-CONCEPTUAL ANALYSIS<br/><br/>3.1. Analysis Of Different Cyber Terminologies In Cognition of the Concept<br/><br/> 3.1.1. Cyberspace<br/><br/> 3.1.2. Cyber Operations<br/><br/> 3.1.3. Information Warfare<br/><br/> 3.1.4. Cyber War<br/><br/> 3.1.5. Cyber Warfare<br/><br/> 3.1.6. Cyber-Crime <br/><br/> 3.1.6.1. Hacking<br/><br/> 3.1.6.2. Computer Viruses<br/><br/> 3.1.6.3. Phishing<br/><br/> 3.1.6.4. Spoofing<br/><br/> 3.1.6.5. Phone Phishing<br/><br/> 3.1.6.6. Internet Pharming<br/><br/> 3.1.6.7. Publishing Pornographic Material In Electronic Form<br/><br/> 3.1.6.8. Investment Newsletter<br/><br/> 3.1.6.9. Credit Card Fraud<br/><br/> 3.1.7. Cyber-attack<br/><br/> 3.1.7.1. Shanghai Cooperation Organisation<br/><br/> 3.1.7.2. Council of Europe's Convention on Cybercrime<br/><br/> 3.1.7.3. US Army's DCSIN7 Handbook No. 1.02<br/><br/> 3.1.7.4. Definition by M. Rossini<br/><br/> 3.1.7.5. Definition in Tallinn Manual <br/><br/> 3.1.7.6. Definition bv Oona Hathaway<br/><br/> 3.1.7.7. The Recommended Definition<br/><br/>(a) Intent<br/><br/>(b) Motive<br/><br/>(c) Actors<br/><br/>(d) Means and methods<br/><br/>(e) Target<br/><br/>(f) Effects<br/><br/>3.2. The Comparison of Cyber-Attack, Cyber-Crime, and Cyber-Warfare<br/><br/>3.3. Cyber Operations and Incidents<br/><br/> 3.3.1. Cyber-attack by the United States America<br/><br/> 3.3.2. Russia and Chechnya<br/><br/> 3.3.3. Kosovo and the U.S.A<br/><br/> 3.3.4. Israel and Palestine<br/><br/> 3.3.5. Estonia and Russia<br/><br/> 3.3.6. Israel and Syria<br/><br/> 3.3.7. Lithuania<br/><br/> 3.3.8. Russia and Georgia<br/><br/> 3.3.9. Russia and Kyrgystan<br/><br/> 3.3.10. South Korea and the U.S.A<br/><br/> 3.3.11. Iran<br/><br/> 3.3.12. Myanmar<br/><br/> 3.3.13. Operation Israel (Oplsrael)<br/><br/> 3.3.14. Singapore<br/><br/> 3.3.15. Operation Shady Rat<br/><br/> 3.3.16. Red October malware<br/><br/> 3.3.17. Wanna cry Ransomware attack<br/><br/> 3.3.18. Attack on Yahoo<br/><br/> <br/><br/>CHAPTER 4<br/><br/>USE OF FORCE AND CYBER ATTACKS<br/><br/>4.1. Principles or Norms to be followed during the Use of Force .<br/><br/> 4.1.1. Jus in Bello<br/><br/> 4.1.2. Jus ad Bellum<br/><br/>4.2. Prohibition on the use of force<br/><br/>4.2.1. Interpretation and the Scope of Article 2(4)<br/><br/>4.2.2. Crossing the threshold of use of force<br/><br/>4.2.3. Application by Analogy?<br/><br/>4.2.4. Leading Approaches<br/><br/>4.2.4.1. Instrument-Based Approach<br/><br/>4.2.4.2. Target-Based Approach<br/><br/>4.2.4.3. Effects-Based Approach<br/><br/>4.2.4.4. Normative Framework by Schmitt<br/><br/>4.2.4.5. Cyber-Physical Systems-Based Approach<br/><br/>4.2.4.6. The Approach by Noah Simmons<br/><br/>4.2.4.7. Tallinn Manual Approach<br/><br/>4.2.4.8. International Committee of Red Cross<br/><br/>4.2.4.9. Other Approaches<br/><br/>4.3. An Expedition through the Present to the Future<br/><br/><br/>CHAPTER 5<br/><br/>USE OF FORCE - EXCEPTIONS<br/><br/>5.1. Technological Concerns with Cyber Crimes<br/><br/>5.1.1. Intrusion<br/><br/>5.1.2. Denial of Service<br/><br/>5.2. Effects of Cyber Attack on Victims vis-a-vis Right of<br/><br/>Self Defence<br/><br/>5.2.1. Revenge on Estonia<br/><br/>5.2.2. Stuxnet the Game Changer<br/><br/>5.2.3. The Moonlight Maze<br/><br/>5.2.4. Lockheed Martin’s<br/><br/>5.2.5. Compromise with US Military Security<br/><br/>5.3. Issues with Exercise of Right of Self Defence<br/><br/>5.3.1. Cyber Attack As An Armed Attack<br/><br/>5.3.1.1. Attribution<br/><br/>5.3.1.2. Jurisdiction<br/><br/>5.3.2. Use of Force in Self Defence<br/><br/>5.3.2.1. Necessity<br/><br/>5.3.2.2. Proportionality<br/><br/>5.3.2.3. Immediacy<br/><br/>5.3.2.4. Imminence<br/><br/>5.4. Anticipatory Self-defence/Pre-emptive/Preventive defence<br/><br/>5.5. Neutrality<br/><br/>5.6. Distinction<br/><br/>5.7. Counter Measures Other Than Use Of Force<br/><br/>5.8. Self-defence Vis A Vis Tallinn Manual<br/><br/>5.9. Other Legal Framework<br/><br/>5.9.1. Jus in Bello<br/><br/>5.9.2. Countermeasures<br/><br/>5.10. Legal Regimes That Directly Deal With Cyber Attacks<br/><br/>5.10.1. United Nations<br/><br/>5.10.2. North Atlantic Treaty Organisation<br/><br/>5.10.3. The Council of Europe<br/><br/>5.10.3. The Organisation of American States<br/><br/>5.10.4. Shanghai Cooperation Organisation<br/><br/>5.11. Legal Regimes That Deal Indirectly With Cyber Attacks<br/><br/>5.11.1. Law of Space<br/><br/>5.11.2. Law of seas<br/><br/>5.11.3. Telecommunications Law<br/><br/>5.11.4. Aviation Law<br/><br/>5.11.5. Treaty Law<br/><br/> <br/><br/>CHAPTER 6<br/><br/>CYBER SECURITY POLICIES AND CYBER WARFARE - A CRITICAL ANALYSIS <br/><br/>6.1. Cyber Security: Indian Perspective<br/><br/>6.1.1. Cyber Security Policy-Need of the hour<br/><br/>6.1.2. Cyber Security Policy of India, 2013 & Countermeasure Framework <br/><br/>6.2. Cyber Warfare and Security- The Russian Perspective<br/><br/>6.2.1. Agencies and Organizations<br/><br/>6.2.2. Role of Hackers and Criminals in Russian Cyber Space Regime<br/><br/>6.2.3. Cyber uses in the generation of Kinetic Effects- Current Regime<br/><br/>6.2.4. The Cyber role in the Russian Propaganda<br/><br/>6.3. Cyber Security Policy: The United States Perspective<br/><br/>6.3.1. Strategic National Cyber Security Objective<br/><br/>6.3.2. Protecting Critical Infrastructure<br/><br/>6.4. Cyber Security Policy: The Chinese Perspective<br/><br/>6.4.1. Cyber Security Law of People’s Republic of China<br/><br/>6.4.1.1. Data Localization<br/><br/>6.4.1.2. Handling of Personal Information<br/><br/>6.4.1.3. Transfer of Personal Information<br/><br/>6.4.1.4. Identity Verification of Internet Users and<br/><br/>Protection of Minors<br/><br/>6.4.1.5. Draft Measures to expand Data Localization<br/><br/>and Cross-Border Transfer Requirements<br/><br/>6.5. Cyber Deterrence<br/><br/>6.5.1. Principles of Cyber Deterrence<br/><br/>6.5.1.1. Deterrence by Punishment<br/><br/>6.5.1.1.1. Conditions of successful Deterrence by Punishment<br/><br/>6.5.1.1.1.1. The credibility of the threat<br/><br/>6.5.1.1.1.2. Capability to display and use of force<br/><br/>6.5.1.1.1.3. Communication of the threat<br/><br/>6.5.1.2. Deterrence by Denial<br/><br/>6.5.2. Challenges to implement deterrence in cyberspace<br/><br/>6.5.2.1. Anonymity<br/><br/>6.5.2.2. Asymmetry<br/><br/>6.5.2.3. Super-Empowerment<br/><br/>6.5.2.4. Temporality<br/><br/>6.5.2.5. Scalability<br/><br/>6.5.3. Applying the existing law on armed conflict to cyber-warfare<br/><br/>6.5.4. Recommendations for successful implementation of the theory of deterrence<br/><br/> in cyberspace<br/><br/> <br/><br/>CHAPTER 7<br/><br/>CONCLUSION AND SUGGESTIONS<br/> |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
9 (RLIN) |
12789 |
Topical term or geographic name entry element |
War (International law); Cyberterrorism; Information warfare (International law) |
856 ## - ELECTRONIC LOCATION AND ACCESS |
Uniform Resource Identifier |
<a href="https://www.clplawbooks.com/book_detail/634#specifications">https://www.clplawbooks.com/book_detail/634#specifications</a> |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
|
Koha item type |
Reference Book |
Edition |
23rd |
Classification part |
343.0999 |
Call number suffix |
KAM |