Eng During last 365 days Approved articles: 1897,   Articles in work: 308 Declined articles: 794 
Library
Articles and journals | Tariffs | Payments | Your profile

Back to contents

Cyber Weapons Restraints as the Safety Enforcement Factor in the Networked World
Tikhanychev Oleg Vasilyevich

PhD in Technical Science

Senior Researcher, "Research Institute for Control, Informatization and Modeling of AVN"

123007, Russia, g. Moscow, pr-d Khoroshevskii 1-I, 5

tow65@yandex.ru

 

 

Abstract.

The subject of the research is the cyber security issues. The object of the research is the features of using cyber weapons that may impact the international and national cyber security. In this review article the author clarifies existing approaches to restraining the use of such weapons. The rapid development of information technologies has resulted in new forms of interstate warfare including that against cyber space attacks. Taking this factor into account, the author of the article provides a review of cyber space security issues and clarifies relevant state security issues. To analyze the aforesaid problems, the author has used the comparative method and systems approach as well as the category approach. To make conclusions, the author has applied the synthesis method. The author states that the problem of unauthorized use of cyber weapons is a systemic one and thus cannot be solved by a state independently and without cooperation with other actors. The author suggests that in order to resolve the issue, it is necessary to apply approaches similar to those that are currently used to restrain the use of military equipment and ultimate technologies. 

Keywords: non-proliferation, cyber weapons, prevention of provocations, protection, provocations in cyber space, cyber-attacks, information warfare, international regulation, nonproliferation obligations, security of the digital society

DOI:

10.25136/2409-7543.2018.2.25377

Article was received:

13-03-2018


Review date:

13-03-2018


Publish date:

26-04-2018


This article written in Russian. You can find full text of article in Russian here .

References
1.
Dzhin Sharp. Ot diktatury k demokratii. Kontseptual'nye osnovy osvobozhdeniya. Institut im.Al'berta Enshteina, 2010. 72 s.
2.
Sharp Gene. The Politics of Nonviolent Action. Boston, MA: Porter Sargent. 1973. 72 p. ISBN 0875580688.
3.
Vypasnyak V.I., Tikhanychev O.V., Gakhov V.R. Kiber-ugrozy avtomatizirovannym sistemam upravleniya // Vestnik Akademii voennykh nauk. 2013. 1 (42). S.103-109.
4.
Shul'ts V.L., Kul'ba V.V., Shelkov A.B., Chernov I.V. Informatsionnoe upravlenie v usloviyakh globalizatsii i geopoliticheskogo protivoborstva // Natsional'naya bezopasnost' / nota bene. 2015. 2. S. 202-243. DOI: 10.7256/2073-8560.2015.2.14622
5.
Chvarkov S.V., Likhonosov A.G. Novyi mnogovektornyi kharakter ugroz bezopasnosti Rossii, vozrosshii udel'nyi ves myagkoi sily i nevoennykh sposobov protivoborstva na mezhdunarodnoi arene // Vestnik akademii voennykh nauk, 2017. 2.
6.
Anisimov E.G., Anisimov V.G., Saurenko T.N., Chvarkov S.V. Voennaya ekonomika i oboronnaya promyshlennost'. Ekonomicheskaya politika v sisteme natsional'noi bezopasnosti Rossiiskoi Federatsii // Vestnik akademii voennykh nauk, 2017.-1. S.137-144
7.
Tikhanychev O.V., Tikhanycheva E.O. Nekotorye aspekty modelirovaniya etnosotsial'nykh protsessov. M.: Editus, 2016. 70 s.
8.
Simavoryan S.Zh., Simonyan A.R., Ulitina E.I., Samarin V.I., Simo-nyan R.A., Kardashyan M.A. Enhancing Operational Efficiency of the Fuzzy Image of the Attacker's Method of Iterations // Modeling of Artificial Intelligence. 2016. 4 (12). S. 187-193.
9.
Akopov G.L. Khaktivizm vyzov natsional'noi bezopasnosti v informatsionnom obshchestve // Natsional'naya bezopasnost' / nota bene. 2015. 4. S. 557-562. DOI: 10.7256/2073-8560.2015.4.15834
10.
Kabernik V.V. Problemy klassifikatsii kiberoruzhiya // Vestnik MGIMO-universiteta. 2013. 2 (29). S.72-78.
11.
Bezkorovainyi M. M., Losev S. A., Tatuzov A. L. Kiberbezopasnost' v sovremennom mire: terminy i soderzhanie // Informatizatsiya i svyaz'. 2011.  6. S. 27-33.
12.
How to avoid hacking to Critical Infrastructure. Sait pandasecurity.com. URL: https://www.pandasecurity.com/mediacenter/pandalabs/whitepaper-critical-infrastructure/
13.
Lebedeva E.V. Informatsionnaya bezopasnost' gosudarstv SNG: etapy realizatsii // Natsional'naya bezopasnost' / nota bene. 2016. 4. S. 500-508. DOI: 10.7256/2073-8560.2016.4.17585
14.
Vladimirova T.V. Ob obespechenii informatsionnoi bezopasnosti v usloviyakh kiberprostranstva // Voprosy bezopasnosti. 2014. 3.- S.132-157. DOI: 10.7256/2306-0417.2014.3.12525. URL: http://e-notabene.ru/nb/article_12525.html
15.
Kibernaemniki i legal'noe vredonosnoe PO. KasperskyClub Daily URL: https://www.kaspersky.ru/blog/legal-malware-counteraction/5539/
16.
Tikhanychev O. V., Gakhov V. R. Kiber-voiny kak real'naya ugroza sistemam gosudarstvennogo upravleniya (po vzglyadam inostrannykh spetsialistov) // Sbornik trudov vtoroi MNTK Komp'yuternye nauki i tekhnologii (KNiT-2011). Belgorodskii GNIU, Belgorod, 2011 g.
17.
Sobolev V.E. Boevye kiberneticheskie sistemy s vysokochastotnoi pertseptsiei informatsii // Voprosy bezopasnosti. 2016.- 6.-S.1-6. DOI: 10.7256/2409-7543.2016.6.21467. URL: http://e-notabene.ru/nb/article_21467.html
18.
United States European Command. Theater Strategy. Gen Philip M. Breedlove, USAF Commander. URL: http://www.eucom.mil/
19.
Roger N. McDermott. Russias Electronic Warfare Capabilities to 2025: Challenging NATO in the Electromagnetic. International Centre for Defence and Security. Tallinn, 2017. 122 p.
20.
Doktrina informatsionnoi bezopasnosti Rossiiskoi Federatsii. Utverzhdena Ukazom Prezidenta Rossiiskoi Federatsii ot 5 dekabrya 2016 g. 646.
21.
Natsional'naya strategiya SShA po dostizheniyu bezopasnosti v kiberprostranstve ("National Strategy to Secure Cyberspace"). URL: http://www.whitehouse.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf
22.
Elementy dlya sozdaniya global'noi kul'tury kiberbezopasnosti. Prinyaty rezolyutsiei 57/239 General'noi Assamblei OON ot 20 dekabrya 2002 goda. URL: http://www.un.org/ru/documents/decl_conv/conventions/elements.shtml
23.
Doklad Gruppy pravitel'stvennykh ekspertov po dostizheniyam v sfere informatizatsii i telekommunikatsii v kontekste mezhdunarodnoi bezopasnosti. Shest'desyat vos'maya sessiya Genassamblei OON. Punkt 94 predvaritel'noi povestki dnya. Dostizheniya v sfere informatizatsii i telekommunikatsii v kontekste mezhdunarodnoi bezopasnosti URL: https://documents-dds-ny.un.org/doc/UNDOC/GEN/N13/371/68/PDF/N1337168.pdf?OpenElement
24.
Konventsiya ob obespechenii mezhdunarodnoi informatsionnoi bezopasnosti (kontseptsiya). URL: http://www.mid.ru/foreign_policy/official_documents/-/asset_publisher/CptICkB6BZ29/content/id/191666
25.
Nesterov A.V. Internet-pole VS kiberprostranstva // Voprosy bezopasnosti. 2015.- 4.-S.13-27. DOI: 10.7256/2409-7543.2015.4.16743. URL: http://e-notabene.ru/nb/article_16743.html
26.
Postanovlenie Pravitel'stva Rossiiskoi Federatsii ot 24 iyulya 1995 g. 737 O prisoedinenii Rossiiskoi Federatsii k mezhdunarodnomu Rezhimu kontrolya za raketnoi tekhnologiei.
27.
Ukaz Prezidenta Rossiiskoi Federatsii o kontrole za eksportom iz Rossiiskoi Federatsii oborudovaniya, materialov i tekhnologii, primenyayushchikhsya pri sozdanii raketnogo oruzhiya ot 16 avgusta 1996 goda 1194.