How does the Goverment Legally Respond to the Cyber Attack? Cases in Australia, People's Republic of China, and India

Edho Aqmal Hakim

Abstract


In the 21stcentury, cyber attacks are one of the biggest threats to international peace. The aim of this paper are to compare responses of different governments in this case Australia, People's Republic of China and India. Literature study provides a variety of information that is processed by comparative analysis. Three countries have their own approach to answer this cyber attacks issue by founded their own cyber security agencies. In recent years, these countries were able to develop and integrated strong defense mechanism against cyber attacks. While international cooperation and international laws against cyber attacks have not yet to be born, applying multi layered defense of active and passive defenses in their own country is the best option to choose so far. However, each country needs to evaluate the impact of cyber attacks and whether their responses have been effective in dealing with these cyber attacks using quantitative analyzes.


Keywords


Comparative Analysis; Cyber Attacks; Defence Mechanism

Full Text:

PDF

References


Australian Cyber Security Centre (ACSC), 2017. ACSC threat Report 2017. Australian Government. Available at: https://www.cyber.gov.au/sites/default/files/2019-03/ACSC_Threat_Report_2017.pdf (accessed 22 May 2020).

Australian Cyber Security Centre (ACSC), 2020. Threat update: COVID-19 malicious cyber activity.

Australian Government. Available at: https://www.cyber.gov.au/threats/threat-update-covid-19-malicious-cyber-activity-20-apr-2020 (accessed 22 May 2020).

“Australia-United Kingdom Ministerial Consultations,” Joint Communiqué, Australian Minister of Foreign Affairs, January 18, 2011, https://webarchive.nationalarchives.gov.uk/20121211162349/http://centralcontent.fco.gov.uk/resources/en/pdf/central-content-pdfs/news/aukmin-iii-joint-communique (accessed 20 May 2020).

Carr, J. Inside Cyber Warfare, Second Edition. California: O’Reilly Media, Inc., 2012.

Cybernaut, 2010. “India to increase its cyberwarfare capabilities,” The Cybernaut, September 5, 2010, accessed August 30, 2011, http://www.thecybernaut.org/2010/09/india-to-increase-its-cyberwarfare-capabilities/ (accessed 20 May 2020).

Chou, E., 2011. “US-China Cyber War Scenario in the Eyes of a Chinese Student,” The Atlantic, February 8, 2011, accessed August 30, 2011, http://www.theatlantic.com/technology/archive/2011/02/us-china-cyber-war-scenario-in-the-eyes-of-a-chinese-student/70855/ (accessed 20 May 2020).

Davies, A. (2015). Intelligence, Information Technology and Cyber Programs. Security Challenges, 5(2), 81-87.

Danchev, D., 2011. “People’s Information Warfare Concept,” Mind Streams of Information Security Knowledge, entry posted October 5, 2011, accessed August 30, 2011, http://ddanchev.blogspot.com/2007/10/peoples-information-warfare-concept.html (accessed 20 May 2020).

Department of Defence, Defending Australia in the Asia-Pacific Century: Force 2030 (Canberra: Commonwealth of Australia, 2009), para. 9.87–88.

Hansche, S. In Official (ISC)2® Guide to the CISSP®-ISSEP® CBK®, 1st Edition. Florida: CRC Press (Auerbach Publications), 2005.

Hudak, T., Krajkowski, Z., and Salerno, A., 2011. “Chinese Cyber Focus Likely On Enemy Military Networks; During Preconflict, China Likely To Use Cyber Attacks To Disrupt Enemy Infrastructure Using All Assets,” Wikispaces, accessed August 30, 2011, http://chinesehackingdisposition.wikispaces.com/ (accessed 20 May 2020).

India Times, 2020. Government likely to announce new cyber security policy in three months. https://economictimes.indiatimes.com/news/defence/government-likely-to-announce-new-cyber-security-policy-in-three-months/articleshow/74580639.cms (accessed 20 May 2020).

Karnouskos, S. Stuxnet worm impact on industrial cyber-physical system security. In 37th annual conference of the IEEE industrial electronics society (IECON 2011) (pp. 4490-4494). Melbourne, AU: IEEE, 2011.

Khanna, S., 2010, “The secret cyber war between India and China accelerates,” India Daily, October 10, 2010, accessed August 30, 2011, http://www.indiadaily.com/editorial/21800.asp (accessed 20 May 2020).

Krekel, B., 2009, “Capability of the People’s Republic of China to Conduct Cyber Warfare and Computer Network Exploitation,” Northrup Grumman, accessed August 30, 2011, http://www.uscc.gov/researchpapers/2009/NorthropGrumman_PRC_Cyber_Paper_FINAL_Approved%20Report_16Oct2009.pdf (accessed 20 May 2020).

Lam, W., 2010. “Beijing Bones up its Cyber-Warfare Capacity,” The Jamestown Foundation: China Brief 10, no. 3 (February 2010), accessed August 30, 2011, http://www.jamestown.org/single/?no_cache=1&tx_ttnews[tt_news]=36007 (accessed 20 May 2020).

Lewis, L., 2011. “China’s Blue Army of 30 computer experts could deploy cyber warfare on foreign powers,” The Australian, May 27, 2011, accessed August 30, 2011, http://www.theaustralian.com.au/australian-it/chinas-blue-army-could-conduct-cyber-warfare-on-foreign-powers/story-e6frgakx-1226064132826 (accessed 20 May 2020).

Miniwatts Marketing Group, 2020. Top 20 Countries with highest number of internet users - 2020 Q1. https://www.internetworldstats.com/top20.htm (accessed 20 May 2020).

Morden, J., 2011. “Australian Govt Reveals New Cyberspooks Unit,” FutureGov Asia Pacific, March 14, 2011, accessed August 29, 2011, http://www.futuregov.asia/articles/2011/mar/14/australia-reveals-new-cyberspooks-unit/ (accessed 20 May 2020).

NDTV, 2010. “Hacked by ‘Pakistan Cyber Army', CBI website still not restored,” NDTV, December 4, 2010, accessed August 30, 2011, http://www.ndtv.com/article/india/hacked-by-pakistan-cyber-army-cbi-website-still-not-restored-70568?cp (accessed 20 May 2020).

Noonan, S., 2010. “China and its Double-edged Cyber-sword,” Stratfor, December 9, 2010, accessed August 30, 2011, http://www.stratfor.com/weekly/20101208-china-and-its-double-edged-cyber-sword (accessed 20 May 2020).

Radziszewski, E., Hanson, B., and Khalid S., 2019, https://thediplomat.com/2019/07/indias-response-to-chinas-cyber-attacks/ (accessed 20 May 2020).

Sanger, D., E. The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age. New York: Crown Publishing Group, 2018.

Sharma, D. (2011). China’s Cyber Warfare Capability and India’s Concerns. Journal of Defence Studies, 5(2), 62-76.

Symantec. 2019. Security Internet Threat Report 2019. Available at: https://www.phishingbox.com/downloads/Symantec-Security-Internet-Threat-Report-ISRT-2019.pdf (accessed 20 May 2020).

Statista, 2021. Number of internet users in the Asia Pacific region as of January 2021, by country (in millions). https://www.statista.com/statistics/265153/number-of-internet-users-in-the-asia-pacific-region (accessed 20 May 2021).

Stavola, E., 2016. When Grown Men Cry: Cyber-attacks and how to prevent them. ImageSource, 18(2), p.24.

Takahashi, T., and Kadobayashi, Y. (2015). Reference Ontology for Cybersecurity Operational Information. The Computer Journal, 58(10), 2297–2312. doi: http://dx.doi.org/10.1093/comjnl/bxu101.

Thomas, K., 2010 “India goes on the offensive in cyber warfare,” The Hindu Business Line, August 3, 2011, accessed August 30, 2011, http://www.thehindubusinessline.com/todays-paper/article1000443.ece?ref=archive (accessed 20 May 2020).

Ulsch, M.. Cyber Threat!: How to Manage the Growing Risk of Cyber Attacks, 1st Edition. New Jersey: Wiley, 2014.

Verizon, 2019. Data Breach Investigations Report 2019. Available at: https://www.phishingbox.com/assets/files/images/Verizon-Data-Breach-Investigations-Report-DBIR-2019.pdf (accessed 20 May 2020).




DOI: http://dx.doi.org/10.29240/negrei.v1i1.2570

Refbacks

  • There are currently no refbacks.


Copyright (c) 2021 Edho Aqmal Hakim

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.

INDEXED BY:

CrossrefMorarefGoogle ScholarDimensionsIndonesia One Search


 

Creative Commons LicenseThis work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.

Negrei's Visitors