How does the Goverment Legally Respond to the Cyber Attack? Cases in Australia, People's Republic of China, and India
DOI:
https://doi.org/10.29240/negrei.v1i1.2570Keywords:
Comparative Analysis, Cyber Attacks, Defence MechanismAbstract
In the 21stcentury, cyber attacks are one of the biggest threats to international peace. The aim of this paper are to compare responses of different governments in this case Australia, People's Republic of China and India. Literature study provides a variety of information that is processed by comparative analysis. Three countries have their own approach to answer this cyber attacks issue by founded their own cyber security agencies. In recent years, these countries were able to develop and integrated strong defense mechanism against cyber attacks. While international cooperation and international laws against cyber attacks have not yet to be born, applying multi layered defense of active and passive defenses in their own country is the best option to choose so far. However, each country needs to evaluate the impact of cyber attacks and whether their responses have been effective in dealing with these cyber attacks using quantitative analyzes.
Downloads
References
Australian Cyber Security Centre (ACSC), 2017. ACSC threat Report 2017. Australian Government. Available at: https://www.cyber.gov.au/sites/default/files/2019-03/ACSC_Threat_Report_2017.pdf (accessed 22 May 2020).
Australian Cyber Security Centre (ACSC), 2020. Threat update: COVID-19 malicious cyber activity.
Australian Government. Available at: https://www.cyber.gov.au/threats/threat-update-covid-19-malicious-cyber-activity-20-apr-2020 (accessed 22 May 2020).
“Australia-United Kingdom Ministerial Consultations,†Joint Communiqué, Australian Minister of Foreign Affairs, January 18, 2011, https://webarchive.nationalarchives.gov.uk/20121211162349/http://centralcontent.fco.gov.uk/resources/en/pdf/central-content-pdfs/news/aukmin-iii-joint-communique (accessed 20 May 2020).
Carr, J. Inside Cyber Warfare, Second Edition. California: O’Reilly Media, Inc., 2012.
Cybernaut, 2010. “India to increase its cyberwarfare capabilities,†The Cybernaut, September 5, 2010, accessed August 30, 2011, http://www.thecybernaut.org/2010/09/india-to-increase-its-cyberwarfare-capabilities/ (accessed 20 May 2020).
Chou, E., 2011. “US-China Cyber War Scenario in the Eyes of a Chinese Student,†The Atlantic, February 8, 2011, accessed August 30, 2011, http://www.theatlantic.com/technology/archive/2011/02/us-china-cyber-war-scenario-in-the-eyes-of-a-chinese-student/70855/ (accessed 20 May 2020).
Davies, A. (2015). Intelligence, Information Technology and Cyber Programs. Security Challenges, 5(2), 81-87.
Danchev, D., 2011. “People’s Information Warfare Concept,†Mind Streams of Information Security Knowledge, entry posted October 5, 2011, accessed August 30, 2011, http://ddanchev.blogspot.com/2007/10/peoples-information-warfare-concept.html (accessed 20 May 2020).
Department of Defence, Defending Australia in the Asia-Pacific Century: Force 2030 (Canberra: Commonwealth of Australia, 2009), para. 9.87–88.
Hansche, S. In Official (ISC)2® Guide to the CISSP®-ISSEP® CBK®, 1st Edition. Florida: CRC Press (Auerbach Publications), 2005.
Hudak, T., Krajkowski, Z., and Salerno, A., 2011. “Chinese Cyber Focus Likely On Enemy Military Networks; During Preconflict, China Likely To Use Cyber Attacks To Disrupt Enemy Infrastructure Using All Assets,†Wikispaces, accessed August 30, 2011, http://chinesehackingdisposition.wikispaces.com/ (accessed 20 May 2020).
India Times, 2020. Government likely to announce new cyber security policy in three months. https://economictimes.indiatimes.com/news/defence/government-likely-to-announce-new-cyber-security-policy-in-three-months/articleshow/74580639.cms (accessed 20 May 2020).
Karnouskos, S. Stuxnet worm impact on industrial cyber-physical system security. In 37th annual conference of the IEEE industrial electronics society (IECON 2011) (pp. 4490-4494). Melbourne, AU: IEEE, 2011.
Khanna, S., 2010, “The secret cyber war between India and China accelerates,†India Daily, October 10, 2010, accessed August 30, 2011, http://www.indiadaily.com/editorial/21800.asp (accessed 20 May 2020).
Krekel, B., 2009, “Capability of the People’s Republic of China to Conduct Cyber Warfare and Computer Network Exploitation,†Northrup Grumman, accessed August 30, 2011, http://www.uscc.gov/researchpapers/2009/NorthropGrumman_PRC_Cyber_Paper_FINAL_Approved%20Report_16Oct2009.pdf (accessed 20 May 2020).
Lam, W., 2010. “Beijing Bones up its Cyber-Warfare Capacity,†The Jamestown Foundation: China Brief 10, no. 3 (February 2010), accessed August 30, 2011, http://www.jamestown.org/single/?no_cache=1&tx_ttnews[tt_news]=36007 (accessed 20 May 2020).
Lewis, L., 2011. “China’s Blue Army of 30 computer experts could deploy cyber warfare on foreign powers,†The Australian, May 27, 2011, accessed August 30, 2011, http://www.theaustralian.com.au/australian-it/chinas-blue-army-could-conduct-cyber-warfare-on-foreign-powers/story-e6frgakx-1226064132826 (accessed 20 May 2020).
Miniwatts Marketing Group, 2020. Top 20 Countries with highest number of internet users - 2020 Q1. https://www.internetworldstats.com/top20.htm (accessed 20 May 2020).
Morden, J., 2011. “Australian Govt Reveals New Cyberspooks Unit,†FutureGov Asia Pacific, March 14, 2011, accessed August 29, 2011, http://www.futuregov.asia/articles/2011/mar/14/australia-reveals-new-cyberspooks-unit/ (accessed 20 May 2020).
NDTV, 2010. “Hacked by ‘Pakistan Cyber Army', CBI website still not restored,†NDTV, December 4, 2010, accessed August 30, 2011, http://www.ndtv.com/article/india/hacked-by-pakistan-cyber-army-cbi-website-still-not-restored-70568?cp (accessed 20 May 2020).
Noonan, S., 2010. “China and its Double-edged Cyber-sword,†Stratfor, December 9, 2010, accessed August 30, 2011, http://www.stratfor.com/weekly/20101208-china-and-its-double-edged-cyber-sword (accessed 20 May 2020).
Radziszewski, E., Hanson, B., and Khalid S., 2019, https://thediplomat.com/2019/07/indias-response-to-chinas-cyber-attacks/ (accessed 20 May 2020).
Sanger, D., E. The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age. New York: Crown Publishing Group, 2018.
Sharma, D. (2011). China’s Cyber Warfare Capability and India’s Concerns. Journal of Defence Studies, 5(2), 62-76.
Symantec. 2019. Security Internet Threat Report 2019. Available at: https://www.phishingbox.com/downloads/Symantec-Security-Internet-Threat-Report-ISRT-2019.pdf (accessed 20 May 2020).
Statista, 2021. Number of internet users in the Asia Pacific region as of January 2021, by country (in millions). https://www.statista.com/statistics/265153/number-of-internet-users-in-the-asia-pacific-region (accessed 20 May 2021).
Stavola, E., 2016. When Grown Men Cry: Cyber-attacks and how to prevent them. ImageSource, 18(2), p.24.
Takahashi, T., and Kadobayashi, Y. (2015). Reference Ontology for Cybersecurity Operational Information. The Computer Journal, 58(10), 2297–2312. doi: http://dx.doi.org/10.1093/comjnl/bxu101.
Thomas, K., 2010 “India goes on the offensive in cyber warfare,†The Hindu Business Line, August 3, 2011, accessed August 30, 2011, http://www.thehindubusinessline.com/todays-paper/article1000443.ece?ref=archive (accessed 20 May 2020).
Ulsch, M.. Cyber Threat!: How to Manage the Growing Risk of Cyber Attacks, 1st Edition. New Jersey: Wiley, 2014.
Verizon, 2019. Data Breach Investigations Report 2019. Available at: https://www.phishingbox.com/assets/files/images/Verizon-Data-Breach-Investigations-Report-DBIR-2019.pdf (accessed 20 May 2020).
Downloads
Published
How to Cite
Issue
Section
Citation Check
License
Authors who publish with NEGREI: Academic Journal of Law and Governance agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License (CC BY-NC-SA 4.0) that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).