[ad_1]
It is believed that China's Military is the chief suspect in the attack on Google's email infrastructure and its servers.
The ability to disable anything – “From power grids to the Stock Exchange”, says Duncan B. Hollis and David G. Post of the National Law Journal. “Thicker Firewalls and better mechanisms to detect and repel cyberspace attack strategy.” How to defend Military, Private, Commercial, and Worldwide infrastructure(s) is a chief concern for cyberspace attack issues.
A Tanker Ship Captain who was requesting aid sent an SOS via wireless radio. The call was heard almost immediately. A helicopter was dispatched as well the sea going vessel that initially received the call. Pirate vessels were descending upon the hapless vehicle, an Indian Oil Tanker.
The pirate boats aborted their attack for fear of the chopper and the arriving rescue ship. The receipt of an SOS by International Law requires its reception by seagoing (air as well) vessels to render assistance “at all possible speed.” This particular incident occurred off the coast of Somalia, January 2009. What about the assistance duties of cyberspace? A Captains mayday call or distress signal requires immediate response and or assistance. In today's world of cybernetics, hyperlinks, and various information and data transmission (transportation)…legal issues arise in responsibility assistance and protection in and on the Internet – a virtual sea. The new type of pirate is here to challenge an threaten all with its “new form of attack(s).” The hacking of a million plus computers that encountered blocked Internet access was commandeered by the hack-attack. Internet networks and Intranets became vulnerable as well. The cyber attack filled newspaper headlines around the world. Government Network Operations, Emergency Telephone Connections, Electronic Banking Services, Hospitals, Colleges and Universities endured major communication and transmission interruptions in 2007.
The compromise of these networks and millions of connecting nodes has suffered repeated attacks. It has also been reported that militaries by the dozens have combined its forces and created what's known as “Cyberforce.”
Security measures, in many cases, challenge hackers to improve their techniques while attacking vulnerable “Open Networks.” Identifying locations of attackers arise from the structure of the Internet. It is almost impossible to enforce the “Cyberspace Criminal Law(s). Military “Laws of War” do not apply so easily when it comes to law enforcement in cyberspace – the tools are merely instrumental protection for “Internet Users.” This recognition can therefore be quite effective in the fight against hackers. Entities in a position to assist would have an opportunity to respond to the sender of the SOS. Attackers could be cut off from users in need. The attackers could be traced to its origin(s) and thereby canceling out further interference from the cyber attack source.
Decisions to assist come only from providers that wish to utilize the aid resources. Holding cyberspace attackers accountable for their destruction/disruptions is not an easy task. All that providers can do is to keep the attack to a minimum level and provide assistance upon availability. The SOS in cyberspace can be heard. Most “Cloud” entities, agencies, and companies are capable of defending their Intranets and Quasi-Networks from major attacks by hackers with many protection tools and firewalls. It does not mean the law can't or won't intervene, especially when defensive and/or preventive measures have been implemented.
The point of the matter is that Internet users can and should expect and receive help from the Internet Cops. The village at large is or at least should be involved in the prevention and reporting of cyberspace attacks.
[ad_2]
Source by Gregory V. Boulware