Publication
Dec 2010
This paper outlines the state-to-state cyber threat to critical-system infrastructures and the role international agreements can play in limiting this threat. It begins by defining a critical system and discussing the actors who pose threats to these systems and the motivations behind their decisions. This is followed by a detailed description of a hypothetical scenario that depicts the methods by which one state could attack another state's critical infrastructure, to include the motivations behind the attack. In conclusion, it makes recommendations regarding the development of an international agreement designed to limit this specific type of attack.
Download |
English (PDF, 29 pages, 141 KB) |
---|---|
Author | Jamal Henry |
Series | CISSM Working Papers |
Publisher | Center for International and Security Studies at Maryland (CISSM) |
Copyright | © 2010 Center for International and Security Studies at Maryland (CISSM) |