Kybernetická zbraň: Přístupy k její definici

Ivana Kudláčková

Abstrakt

Odhalení počítačového červa Stuxnet v roce 2010 lze označit za zlomový okamžik, který zintenzivnil debaty o kybernetických zbraních. K těm je v odborné literatuře přistupováno různými způsoby, proto si tento příspěvek klade za cíl tyto rozdílné přístupy k definici pojmu kybernetická zbraň zmapovat a následně je aplikovat na reálné kybernetické incidenty.

Právě odhalení Stuxnetu je pro svůj dopad výchozím bodem, od kterého byla prováděna rešerše literatury, která se zabývá pojmem kybernetická zbraň. Za tímto účelem byly analyzovány odborné příspěvky publikované v období let 2010-2019 zařazené vdatabázích DBLP Computer Science Bibliography Website, Scopus a Web of Science.

Provedená analýza posloužila kpředstavení hlavních přístupů ke kybernetickým zbraním. Definice byly poté podrobeny analýze a byly identifikovány dva hlavní faktory způsobující názorový nesoulad.

Bibliografická citace

KUDLÁČKOVÁ, Ivana. Kybernetická zbraň: Přístupy k její definici. Revue pro právo a technologie. [Online]. 2020, č. 21, s. 47-71. [cit. 2020-09-21]. Dostupné z: https://journals.muni.cz/revue/article/view/12603

Klíčová slova

kybernetická zbraň, kybernetický incident, malware, Stuxnet

Plný Text:

Reference

Zobrazit literaturu Skrýt literaturu

  1. ARIMATSU, Louise. A treaty for governing cyber-weapons: Potential benefits and practical limitations. In: Conference on Cyber Conflict Proceedings 2012. Tallinn: CCD COE Publications, 2012, str. 91-109. ISBN 978-9949-9040-9-9.
  2. BAER, Merritt. Toward Criteria for International Cyber Weapons Bans. In: 2013 World Cyberspace Cooperation Summit IV (WCC4) Proceedings. IEEE Explore. 2013, str. 1-3. https://doi.org/10.1109/WCS.2013.7050500
  3. BARZASZKA, Ivanka. Are cyber-weapons effective? The RUSI Journal. 2013, 158(2), str. 48-56. https://doi.org/10.1080/03071847.2013.787735
  4. BELLOVIN, Steven M.; LANDAU, Susan; LIN, Herbert S. Limiting the undesired impact of cyber weapons: technical requirements and policy implications. Journal of Cybersecurity. 2017, 3(1), str. 59-68. https://doi.org/10.2139/ssrn.2809463
  5. CARR, Jeffrey. The misunderstood acronym: Why cyber weapons aren’t WMD. Bulletin of the Atomic Scientists. 2013, 69(5), str. 32-37. https://doi.org/10.1177/0096340213501373
  6. EGGENSCHWILLER, Jacqueline; SILOMON, Jantje. Challenges and opportunities in cyber weapon norm construction. Computer Fraud & Security. 2018, 12, str. 11-18. https://doi.org/10.1016/S1361-3723(18)30120-9
  7. FILSHTINSKIY, Stas. Privacy and security: Cybercrime, Cyberweapons, Cyber Wars: Is There Too Much of It in the Air? Communications of the ACM. 2013, 56(6), 28-30. https://doi.org/10.1145/2461256.2461266
  8. GEERS, Kenneth.Cyber Weapons Convention. Computer Law & Security Review. 2010, 26(5), str. 547-551. https://doi.org/10.1016/j.clsr.2010.07.005
  9. HAMBLING, David. Hints of a new cyberweapon: GPS spoofing may have thrown vessels off course in the Black Sea. New Scientist. 2017, 235(3139), str. 6. https://doi.org/10.1016/S0262-4079(17)31594-4
  10. HARE, Forrest B. Precision cyber weapon systems: An important component of a responsible national security strategy? Contemporary Security Policy. 2019, 40(2), str. 193-213. https://doi.org/10.1080/13523260.2018.1529369
  11. HATCH, Benjamin B. Defining a Class of Cyber Weapons as WMD: An Examination of the Merits. Journal of Strategic Security. 2018, 11(1), str. 43-61. https://doi.org/10.5038/1944-0472.11.1.1657
  12. KALLBERG, Jan. The Second Amendment and Cyber Weapons: Constitutional Relevance of Digital Gun Rights. IEEE Technology and Society Magazine. 2019, 38(2), str. 71-77. https://doi.org/10.1109/MTS.2019.2913073
  13. KARLSSON, Marcus; LARSSON, Erik G. Massive MIMO as a cyber-weapon. In: 2014 48th Asilomar Conference on Signals, Systems and Computers Proceedings. 2014, str. 661-665. ISBN 978-1-4799-8297-4. https://doi.org/10.1109/ACSSC.2014.7094529
  14. KIM, Ki Hoon; EOM, Jung Ho. Modeling of Cyber Target Selection for Effective Acquisition of Cyber Weapon Systems. International Journal of Security and Its Applications. 2016, 10(11), str. 293-302. https://doi.org/10.14257/ijsia.2016.10.11.24
  15. KIRAVUO, Timo; SÄRELÄ, Mikko; MANNER, Jukka. Weapons against Cyber-Physical Targets. In: 2013 IEEE 33rd International Conference on Distributed Computing Systems Workshops Proceedings. USA: IEEE Computer Society Conference Publishing Services. 2013, str. 321-326. ISBN 978-0-7685-5023-7. https://doi.org/10.1109/ICDCSW.2013.43
  16. KOBLENTZ, Gregory D.; MAZANEC, Brian M. Viral Warfare: The Security Implications of Cyber and Biological Weapons. Comparative Strategy. 2013, 32(5), str. 418-434. https://doi.org/10.1080/01495933.2013.821845
  17. KUSHWAHA, Neal; WATSON, Bruce William. Cyber weapons and the U.S. In: Proceedings of the 17th European Conference on Cyber Warfare and Security. 2018, str. 1-11. ISBN: 978-1-911218-85-2
  18. LANGER, Ralph. Stuxnet: Dissecting a Cyberwarfare Weapon. IEEE Security Privacy. 2011, 9(3), str. 49-51. https://doi.org/10.1109/MSP.2011.67
  19. LANGER, Ralph. To Kill a Centrifuge. A Technical Analysis of What Stuxnet’s Creators Tried to Achieve. [online]. 2013 [cit. 25. 10. 2019]. Dostupné z: https://www.langner.com/wp-content/uploads/2017/04/To-kill-a-centrifuge.pdf
  20. LIN, Patrick; ALLHOFF, Fritz; ROWE, Neil C. Computing Ethics: War 2.0 Cyberweapons and Ethics. Communications of the ACM. 2012, 55(3), str. 24-26. https://doi.org/10.1145/2093548.2093558
  21. LORENTS, Peeter; OTTIS, Rain. Knowledge based framework for cyber weapons and conflict. In: Conference on Cyber Conflict Proceedings 2010. Tallinn: CCD COE Publications, 2010, str. 129-142. ISBN: 978-9949-9040-1-3.
  22. MAITRA, Amit K. Offensive cyber-weapons: technical, legal, and strategic aspects. Environment Systems and Decisions. 2015, 35(1), str. 169-182. https://doi.org/10.1007/s10669-014-9520-7
  23. MATHIUS, Clara; PIETERS, Wolter; BERG, Jan van den. Cyber weapons: a profiling framework. In: 2016 IEEE International Conference on Cyber Conflict (CyCon U.S.) Proceedings. USA: IEEE eXpress Conference Publishing. 2016, str. 94-101. ISBN 978-1-5090-5258-5. https://doi.org/10.1109/CYCONUS.2016.7836621
  24. MEZZOUR, Ghita; CARLEY, Kathleen M.; CARLEY, L. Richard. Remote assessment of countries’ cyber weapon capabilities. Social Network Analysis and Mining. 2018, 8(1), str. 1-15. https://doi.org/10.1007/s13278-018-0539-5
  25. NGUYEN, Nam-Phong; NGO, Hien Quoc; DUONG, Trung Quang; TUAN, Hoang Duong; COSTA, Daniel Benevides da. Full-Duplex Cyber-Weapon With Massive Arrays. IEEE Transactions on Communications. 2017, 65(12), str. 5544-5558. https://doi.org/10.1109/TCOMM.2017.2743208
  26. PAVUR, James; MARTINOVIC, Ivan. The Cyber-ASAT: On the Impact of Cyber Weapons in Outer Space. In: Conference on Cyber Conflict Proceedings 2019. Tallinn: CCD COE Publications, 2019, str. 213-230. ISBN 978-9949-9904-5-0. https://doi.org/10.23919/CYCON.2019.8756904
  27. PETERSON, Dale. Offensive Cyber Weapons: Construction, Development, and Employment. Journal of Strategic Studies. 2013, 36(1), str. 120-124. https://doi.org/10.1080/01402390.2012.742014
  28. RAYMOND, David; CONTI, Gregory J.; CROSS, Tom; FANELLI, Robert. A control measure framework to limit collateral damage and propagation of cyber weapons. In: Conference on Cyber Conflict Proceedings 2013. Tallinn: CCD COE Publications, 2013, str. 181-196. ISBN 978-9949-9211-5-7.
  29. RID, Thomas; McBURNEY, Peter. Cyber-Weapons. The RUSI Journal. 2012, 157(1), str. 6-13. https://doi.org/10.1080/03071847.2012.664354
  30. SINGER, Tassilo V. P. Update to revolving door 2.0: The extension of the period for direct participation in hostilities due to autonomous cyber weapons. In: Conference on Cyber Conflict Proceedings 2017. Tallinn: CCD COE Publications, 2017, str. 121-133. ISBN 978-9949-9904-1-2. https://doi.org/10.23919/CYCON.2017.8240332
  31. TYUGU, Enn. Command and control of cyber weapons. In: Conference on Cyber Conflict Proceedings 2012. Tallinn: CCD COE Publications, 2012, str. 333-343. ISBN 978-9949-9040-9-9.
  32. TYUGU, Enn. Situation awareness and control errors of cyber weapons. In: IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support (CogSIMA). 2013, str. 143-148. ISBN 9781467324366. https://doi.org/10.1109/CogSIMA.2013.6523838
  33. WELSH, Thomas. A Cybersecurity Threat Model for the Detection of a Ransomware Cyberweapon in a Networked Computing Environment. In: 2019 IEEE 12th International Conference on Global Security, Safety and Sustainability (ICGS3). 2019, str. 212. ISBN 9781538670026. https://doi.org/10.1109/ICGS3.2019.8688353
  34. YAMIN, Muhammad Mudassar; KATT, Basel; KIANPOUR, Mazaher. Cyber Weapons Storage Mechanisms. In: Security, Privacy, and Anonymity in Computation, Communication, and Storage. 2019, str. 354-367. ISBN 9783030249076. https://doi.org/10.1007/978-3-030-24907-6_27
  35. ZHIOUA, Sami. The Middle East under Malware Attack Dissecting Cyber Weapons. In: 2013 IEEE 33rd International Conference on Distributed Computing Systems Workshops Proceedings. USA: IEEE Computer Society Conference Publishing Services. 2013, str. 11-16. ISBN 978-0-7685-5023-7. https://doi.org/10.1109/ICDCSW.2013.30
  36. Staged cyber attack reveals vulnerability in power grid. Dostupné z: https://www.youtube.com/watch?v=fJyWngDco3g [vid. 5. února 2020]

https://doi.org/10.5817/RPT2020-1-3


Copyright (c) 2020 Ivana Kudláčková

Creative Commons License
Tato práce je licencována pod licencí Creative Commons Attribution-ShareAlike 4.0 International License.