Contents
CHAPTER ONE: INTRODUCTION .................................................................................................................... 1
1.1 INTRODUCTION ................................................................................................................................... 1
1.2 BACKGROUND ..................................................................................................................................... 1
1.3 PROBLEM STATEMENT ........................................................................................................................ 4
1. 4 OBJECTIVES ........................................................................................................................................ 4
1.5 LITERATURE REVIEW ........................................................................................................................... 5
1.6 METHODOLOGY .................................................................................................................................. 6
1.7 CHAPTER SYNOPSIS ............................................................................................................................. 6
CHAPTER TWO: THE CONCEPT OF CYBER WARFARE .................................................................................... 8
2.1 INTRODUCTION ................................................................................................................................... 8
2.2 CYBERSPACE ........................................................................................................................................ 8
2.3 COMPUTER NETWORKS ATTACK (or CNA) .......................................................................................... 9
2.4 CYBER-ATTACK .................................................................................................................................... 9
2.5 CYBER OPERATION ............................................................................................................................ 10
2.6 CYBER WARFARE ............................................................................................................................... 10
2.7 EXAMPLES OF CYBER-ATTACKS ......................................................................................................... 11
The Estonian Attack in 2007 ............................................................................................................... 11
The Georgian Attack 2008................................................................................................................... 12
Stuxnet ................................................................................................................................................ 12
Red October ........................................................................................................................................ 13
2.8 UNIQUE CHARACTERISTICS OF CYBER WARFARE ............................................................................. 13
2.9 CONCLUSION ..................................................................................................................................... 15
CHAPTER THREE: CYBER WARFARE AND INTERNATIONAL LAW ................................................................ 16
3.1 INTRODUCTION ................................................................................................................................. 16
3.2 APPLICABILITY OF THE EXISTING RULES ............................................................................................ 16
3.3. PROHIBITION OF THE USE OF FORCE UNDER INTERNATIONAL LAW .............................................. 17
3.3.1 NOTION OF 'FORCE' ................................................................................................................... 17
3.3.2 CYBER OPERATION AS USES OF FORCE ...................................................................................... 17
3.3.3 CYBER ASSISTANCE AS FORCE .................................................................................................... 19
3.3.4 ECONOMIC OR POLITICAL FORCE .............................................................................................. 19
3.4 CYBER OPERATION AS ARMED ATTACKS AND THE RIGHT TO SELF-DEFENCE .................................. 20
JONASI, L (2021). A Critical Analysis Of The Applicability Of International Humanitarian Law In The Context Of Cyber Warfare. Afribary. Retrieved from https://tracking.afribary.com/works/a-critical-analysis-of-the-applicability-of-international-humanitarian-law-in-the-context-of-cyber-warfare
JONASI, LUCKY "A Critical Analysis Of The Applicability Of International Humanitarian Law In The Context Of Cyber Warfare" Afribary. Afribary, 04 May. 2021, https://tracking.afribary.com/works/a-critical-analysis-of-the-applicability-of-international-humanitarian-law-in-the-context-of-cyber-warfare. Accessed 24 Nov. 2024.
JONASI, LUCKY . "A Critical Analysis Of The Applicability Of International Humanitarian Law In The Context Of Cyber Warfare". Afribary, Afribary, 04 May. 2021. Web. 24 Nov. 2024. < https://tracking.afribary.com/works/a-critical-analysis-of-the-applicability-of-international-humanitarian-law-in-the-context-of-cyber-warfare >.
JONASI, LUCKY . "A Critical Analysis Of The Applicability Of International Humanitarian Law In The Context Of Cyber Warfare" Afribary (2021). Accessed November 24, 2024. https://tracking.afribary.com/works/a-critical-analysis-of-the-applicability-of-international-humanitarian-law-in-the-context-of-cyber-warfare