A matter of time: On the transitory nature of cyberweapons

作者: Max Smeets

DOI: 10.1080/01402390.2017.1288107

关键词:

摘要: ABSTRACTThis article examines the transitory nature of cyberweapons. Shedding light on this highly understudied facet is important both for grasping how cyberspace affects international security and policymakers’ efforts to make accurate decisions regarding deployment First, laying out life cycle a cyberweapon, I argue that these offensive capabilities are different in ‘degree’ ‘kind’ compared with other their temporary ability cause harm or damage. Second, develop six propositions which indicate not only technical features, inherent types cyber – is, type exploited vulnerability, access payload but also offender defender characteristics explain differences transitoriness between Finally, drawing implications, reveal cyberweapons benefits great powers, changes incentive structure cooperation induces differe...

参考文章(33)
Robert P. Bartlett, Developments in the Law--The Law of Cyberspace Harvard Law Review. ,vol. 112, pp. 1574- ,(1999)
Anand Nandkumar, Ashish Arora, Rahul Telang, Ramayya Krishnan, H. John Heinz, Yubao Yang, Impact of Vulnerability Disclosure and Patch Availability - An Empirical Analysis ,(2004)
Philip E. Auerswald, Christian Duttweiler, John Garofano, Clinton's foreign policy : a documentary record Kluwer Law International. ,(2003)
Antonio Nappa, Richard Johnson, Leyla Bilge, Juan Caballero, Tudor Dumitras, The Attack of the Clones: A Study of the Impact of Shared Code on Vulnerability Patching 2015 IEEE Symposium on Security and Privacy. pp. 692- 708 ,(2015) , 10.1109/SP.2015.48
Kevin D. Mitnick, William L. Simon, The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers John Wiley & Sons, Inc.. ,(2005)
Christa Frei, Alfonso Sousa-Poza, Overqualification: permanent or transitory? Applied Economics. ,vol. 44, pp. 1837- 1847 ,(2012) , 10.1080/00036846.2011.554380
Julian Jang-Jaccard, Surya Nepal, None, A survey of emerging threats in cybersecurity Journal of Computer and System Sciences. ,vol. 80, pp. 973- 993 ,(2014) , 10.1016/J.JCSS.2014.02.005
K. Tsipenyuk, B. Chess, G. McGraw, Seven pernicious kingdoms: a taxonomy of software security errors ieee symposium on security and privacy. ,vol. 3, pp. 81- 84 ,(2005) , 10.1109/MSP.2005.159