Kybernetická zbraň: Přístupy k její definici
Roč.11,č.21(2020)
Odhalení počítačového červa Stuxnet v roce 2010 lze označit za zlomový okamžik, který zintenzivnil debaty o kybernetických zbraních. K těm je v odborné literatuře přistupováno různými způsoby, proto si tento příspěvek klade za cíl tyto rozdílné přístupy k definici pojmu kybernetická zbraň zmapovat a následně je aplikovat na reálné kybernetické incidenty.
Právě odhalení Stuxnetu je pro svůj dopad výchozím bodem, od kterého byla prováděna rešerše literatury, která se zabývá pojmem kybernetická zbraň. Za tímto účelem byly analyzovány odborné příspěvky publikované v období let 2010-2019 zařazené vdatabázích DBLP Computer Science Bibliography Website, Scopus a Web of Science.
Provedená analýza posloužila kpředstavení hlavních přístupů ke kybernetickým zbraním. Definice byly poté podrobeny analýze a byly identifikovány dva hlavní faktory způsobující názorový nesoulad.
kybernetická zbraň; kybernetický incident; malware; Stuxnet
s. 47–71
Ivana Kudláčková
Ústav práva a technologií, Právnická fakulta, Masarykova univerzita
- ARIMATSU, Louise. A treaty for governing cyber-weapons: Potential benefits and practical limitations. In: Conference on Cyber Conflict Proceedings 2012. Tallinn: CCD COE Publications, 2012, str. 91-109. ISBN 978-9949-9040-9-9.
- BAER, Merritt. Toward Criteria for International Cyber Weapons Bans. In: 2013 World Cyberspace Cooperation Summit IV (WCC4) Proceedings. IEEE Explore. 2013, str. 1-3. https://doi.org/10.1109/WCS.2013.7050500
- BARZASZKA, Ivanka. Are cyber-weapons effective? The RUSI Journal. 2013, 158(2), str. 48-56. https://doi.org/10.1080/03071847.2013.787735
- BELLOVIN, Steven M.; LANDAU, Susan; LIN, Herbert S. Limiting the undesired impact of cyber weapons: technical requirements and policy implications. Journal of Cybersecurity. 2017, 3(1), str. 59-68. https://doi.org/10.2139/ssrn.2809463
- CARR, Jeffrey. The misunderstood acronym: Why cyber weapons aren’t WMD. Bulletin of the Atomic Scientists. 2013, 69(5), str. 32-37. https://doi.org/10.1177/0096340213501373
- EGGENSCHWILLER, Jacqueline; SILOMON, Jantje. Challenges and opportunities in cyber weapon norm construction. Computer Fraud & Security. 2018, 12, str. 11-18. https://doi.org/10.1016/S1361-3723(18)30120-9
- FILSHTINSKIY, Stas. Privacy and security: Cybercrime, Cyberweapons, Cyber Wars: Is There Too Much of It in the Air? Communications of the ACM. 2013, 56(6), 28-30. https://doi.org/10.1145/2461256.2461266
- GEERS, Kenneth.Cyber Weapons Convention. Computer Law & Security Review. 2010, 26(5), str. 547-551. https://doi.org/10.1016/j.clsr.2010.07.005
- HAMBLING, David. Hints of a new cyberweapon: GPS spoofing may have thrown vessels off course in the Black Sea. New Scientist. 2017, 235(3139), str. 6. https://doi.org/10.1016/S0262-4079(17)31594-4
- HARE, Forrest B. Precision cyber weapon systems: An important component of a responsible national security strategy? Contemporary Security Policy. 2019, 40(2), str. 193-213. https://doi.org/10.1080/13523260.2018.1529369
- HATCH, Benjamin B. Defining a Class of Cyber Weapons as WMD: An Examination of the Merits. Journal of Strategic Security. 2018, 11(1), str. 43-61. https://doi.org/10.5038/1944-0472.11.1.1657
- KALLBERG, Jan. The Second Amendment and Cyber Weapons: Constitutional Relevance of Digital Gun Rights. IEEE Technology and Society Magazine. 2019, 38(2), str. 71-77. https://doi.org/10.1109/MTS.2019.2913073
- KARLSSON, Marcus; LARSSON, Erik G. Massive MIMO as a cyber-weapon. In: 2014 48th Asilomar Conference on Signals, Systems and Computers Proceedings. 2014, str. 661-665. ISBN 978-1-4799-8297-4. https://doi.org/10.1109/ACSSC.2014.7094529
- KIM, Ki Hoon; EOM, Jung Ho. Modeling of Cyber Target Selection for Effective Acquisition of Cyber Weapon Systems. International Journal of Security and Its Applications. 2016, 10(11), str. 293-302. https://doi.org/10.14257/ijsia.2016.10.11.24
- KIRAVUO, Timo; SÄRELÄ, Mikko; MANNER, Jukka. Weapons against Cyber-Physical Targets. In: 2013 IEEE 33rd International Conference on Distributed Computing Systems Workshops Proceedings. USA: IEEE Computer Society Conference Publishing Services. 2013, str. 321-326. ISBN 978-0-7685-5023-7. https://doi.org/10.1109/ICDCSW.2013.43
- KOBLENTZ, Gregory D.; MAZANEC, Brian M. Viral Warfare: The Security Implications of Cyber and Biological Weapons. Comparative Strategy. 2013, 32(5), str. 418-434. https://doi.org/10.1080/01495933.2013.821845
- KUSHWAHA, Neal; WATSON, Bruce William. Cyber weapons and the U.S. In: Proceedings of the 17th European Conference on Cyber Warfare and Security. 2018, str. 1-11. ISBN: 978-1-911218-85-2
- LANGER, Ralph. Stuxnet: Dissecting a Cyberwarfare Weapon. IEEE Security Privacy. 2011, 9(3), str. 49-51. https://doi.org/10.1109/MSP.2011.67
- LANGER, Ralph. To Kill a Centrifuge. A Technical Analysis of What Stuxnet’s Creators Tried to Achieve. [online]. 2013 [cit. 25. 10. 2019]. Dostupné z: https://www.langner.com/wp-content/uploads/2017/04/To-kill-a-centrifuge.pdf
- LIN, Patrick; ALLHOFF, Fritz; ROWE, Neil C. Computing Ethics: War 2.0 Cyberweapons and Ethics. Communications of the ACM. 2012, 55(3), str. 24-26. https://doi.org/10.1145/2093548.2093558
- LORENTS, Peeter; OTTIS, Rain. Knowledge based framework for cyber weapons and conflict. In: Conference on Cyber Conflict Proceedings 2010. Tallinn: CCD COE Publications, 2010, str. 129-142. ISBN: 978-9949-9040-1-3.
- MAITRA, Amit K. Offensive cyber-weapons: technical, legal, and strategic aspects. Environment Systems and Decisions. 2015, 35(1), str. 169-182. https://doi.org/10.1007/s10669-014-9520-7
- MATHIUS, Clara; PIETERS, Wolter; BERG, Jan van den. Cyber weapons: a profiling framework. In: 2016 IEEE International Conference on Cyber Conflict (CyCon U.S.) Proceedings. USA: IEEE eXpress Conference Publishing. 2016, str. 94-101. ISBN 978-1-5090-5258-5. https://doi.org/10.1109/CYCONUS.2016.7836621
- MEZZOUR, Ghita; CARLEY, Kathleen M.; CARLEY, L. Richard. Remote assessment of countries’ cyber weapon capabilities. Social Network Analysis and Mining. 2018, 8(1), str. 1-15. https://doi.org/10.1007/s13278-018-0539-5
- NGUYEN, Nam-Phong; NGO, Hien Quoc; DUONG, Trung Quang; TUAN, Hoang Duong; COSTA, Daniel Benevides da. Full-Duplex Cyber-Weapon With Massive Arrays. IEEE Transactions on Communications. 2017, 65(12), str. 5544-5558. https://doi.org/10.1109/TCOMM.2017.2743208
- PAVUR, James; MARTINOVIC, Ivan. The Cyber-ASAT: On the Impact of Cyber Weapons in Outer Space. In: Conference on Cyber Conflict Proceedings 2019. Tallinn: CCD COE Publications, 2019, str. 213-230. ISBN 978-9949-9904-5-0. https://doi.org/10.23919/CYCON.2019.8756904
- PETERSON, Dale. Offensive Cyber Weapons: Construction, Development, and Employment. Journal of Strategic Studies. 2013, 36(1), str. 120-124. https://doi.org/10.1080/01402390.2012.742014
- RAYMOND, David; CONTI, Gregory J.; CROSS, Tom; FANELLI, Robert. A control measure framework to limit collateral damage and propagation of cyber weapons. In: Conference on Cyber Conflict Proceedings 2013. Tallinn: CCD COE Publications, 2013, str. 181-196. ISBN 978-9949-9211-5-7.
- RID, Thomas; McBURNEY, Peter. Cyber-Weapons. The RUSI Journal. 2012, 157(1), str. 6-13. https://doi.org/10.1080/03071847.2012.664354
- SINGER, Tassilo V. P. Update to revolving door 2.0: The extension of the period for direct participation in hostilities due to autonomous cyber weapons. In: Conference on Cyber Conflict Proceedings 2017. Tallinn: CCD COE Publications, 2017, str. 121-133. ISBN 978-9949-9904-1-2. https://doi.org/10.23919/CYCON.2017.8240332
- TYUGU, Enn. Command and control of cyber weapons. In: Conference on Cyber Conflict Proceedings 2012. Tallinn: CCD COE Publications, 2012, str. 333-343. ISBN 978-9949-9040-9-9.
- TYUGU, Enn. Situation awareness and control errors of cyber weapons. In: IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support (CogSIMA). 2013, str. 143-148. ISBN 9781467324366. https://doi.org/10.1109/CogSIMA.2013.6523838
- WELSH, Thomas. A Cybersecurity Threat Model for the Detection of a Ransomware Cyberweapon in a Networked Computing Environment. In: 2019 IEEE 12th International Conference on Global Security, Safety and Sustainability (ICGS3). 2019, str. 212. ISBN 9781538670026. https://doi.org/10.1109/ICGS3.2019.8688353
- YAMIN, Muhammad Mudassar; KATT, Basel; KIANPOUR, Mazaher. Cyber Weapons Storage Mechanisms. In: Security, Privacy, and Anonymity in Computation, Communication, and Storage. 2019, str. 354-367. ISBN 9783030249076. https://doi.org/10.1007/978-3-030-24907-6_27
- ZHIOUA, Sami. The Middle East under Malware Attack Dissecting Cyber Weapons. In: 2013 IEEE 33rd International Conference on Distributed Computing Systems Workshops Proceedings. USA: IEEE Computer Society Conference Publishing Services. 2013, str. 11-16. ISBN 978-0-7685-5023-7. https://doi.org/10.1109/ICDCSW.2013.30
- Staged cyber attack reveals vulnerability in power grid. Dostupné z: https://www.youtube.com/watch?v=fJyWngDco3g [vid. 5. února 2020]
Tato práce je licencována pod Mezinárodní licencí Creative Commons Attribution-ShareAlike 4.0.
Copyright © 2020 Ivana Kudláčková