SSOAR Logo
    • Deutsch
    • English
  • English 
    • Deutsch
    • English
  • Login
SSOAR ▼
  • Home
  • About SSOAR
  • Guidelines
  • Publishing in SSOAR
  • Cooperating with SSOAR
    • Cooperation models
    • Delivery routes and formats
    • Projects
  • Cooperation partners
    • Information about cooperation partners
  • Information
    • Possibilities of taking the Green Road
    • Grant of Licences
    • Download additional information
  • Operational concept
Browse and search Add new document OAI-PMH interface
JavaScript is disabled for your browser. Some features of this site may not work without it.

Download PDF
Download full text

(235.9Kb)

Citation Suggestion

Please use the following Persistent Identifier (PID) to cite this document:
https://nbn-resolving.org/urn:nbn:de:0168-ssoar-98422-6

Exports for your reference manager

Bibtex export
Endnote export

Display Statistics
Share
  • Share via E-Mail E-Mail
  • Share via Facebook Facebook
  • Share via Bluesky Bluesky
  • Share via Reddit reddit
  • Share via Linkedin LinkedIn
  • Share via XING XING

The attribution dividend: protecting critical infrastructure from cyber attacks

[comment]

Bendiek, Annegret
Bund, Jakob
Kerttunen, Mika

Corporate Editor
Stiftung Wissenschaft und Politik -SWP- Deutsches Institut für Internationale Politik und Sicherheit

Abstract

International law and voluntary norms have not effectively prevented state, proxy, or other criminals from malicious and harmful behaviour in cyberspace. Geopolitical confrontation and tension beyond cyberspace with major threat actors have largely exhausted sanctions. Faced with threats that prove ... view more

International law and voluntary norms have not effectively prevented state, proxy, or other criminals from malicious and harmful behaviour in cyberspace. Geopolitical confrontation and tension beyond cyberspace with major threat actors have largely exhausted sanctions. Faced with threats that prove difficult to deter, the European Union (EU), its Member States, and international partners need to refocus their atten­tion on creating friction for malicious activity and increasing the costs of adversary operations. Through their contributions to resilience, forensic capabilities and inter­national cooperation on technical investigations offer practical opportunities to blunt the tools of adversaries. By coordinating technical, political, and legal attribution at the EU level, Member States could reinforce a victim-oriented approach to cyber diplomacy. (author's abstract)... view less

Keywords
EU; security policy; infrastructure; sabotage; threat; espionage; law of nations

Classification
Peace and Conflict Research, International Conflicts, Security Policy

Free Keywords
Kritische Infrastrukturen; Informationssicherheit; Cyberspace; Hacken/Hacker; Computerkriminalität; Gegenmaßnahme; Politische Verantwortung; Zurechnung; Gemeinsame Sicherheits- und Verteidigungspolitik (EU); Instrumente der Verteidigungs- und Sicherheitspolitik; Politisch-diplomatische Maßnahmen; Völkerrechtliche Verantwortung und Haftung

Document language
English

Publication Year
2024

City
Berlin

Page/Pages
8 p.

Series
SWP Comment, 46/2024

DOI
https://doi.org/10.18449/2024C46

ISSN
2747-5107

Status
Published Version; reviewed

Licence
Deposit Licence - No Redistribution, No Modifications


GESIS LogoDFG LogoOpen Access Logo
Home  |  Legal notices  |  Operational concept  |  Privacy policy
© 2007 - 2025 Social Science Open Access Repository (SSOAR).
Based on DSpace, Copyright (c) 2002-2022, DuraSpace. All rights reserved.
 

 


GESIS LogoDFG LogoOpen Access Logo
Home  |  Legal notices  |  Operational concept  |  Privacy policy
© 2007 - 2025 Social Science Open Access Repository (SSOAR).
Based on DSpace, Copyright (c) 2002-2022, DuraSpace. All rights reserved.
 

 

This website uses cookies. The data policy provides further information, including your rights for opt-out.