Publication

Dec 2010

This paper outlines the state-to-state cyber threat to critical-system infrastructures and the role international agreements can play in limiting this threat. It begins by defining a critical system and discussing the actors who pose threats to these systems and the motivations behind their decisions. This is followed by a detailed description of a hypothetical scenario that depicts the methods by which one state could attack another state's critical infrastructure, to include the motivations behind the attack. In conclusion, it makes recommendations regarding the development of an international agreement designed to limit this specific type of attack.

Download English (PDF, 29 pages, 141 KB)
Author Jamal Henry
Series CISSM Working Papers
Publisher Center for International and Security Studies at Maryland (CISSM)
Copyright © 2010 Center for International and Security Studies at Maryland (CISSM)
JavaScript has been disabled in your browser