Wanted: An International Cyber Security Law

There is an increasing amount of government backed international hacking with the aim to steal government and commercial secrets. And this is often done using DNS attacks/hacks. The Domain Name System (DNS) is a central part of the Internet, providing a way to match names, such as a website that you are looking for, to the numbers that are the address for the website. 

Anything connected to the Internet - laptops, tablets, mobile phones, websites - has an Internet Protocol (IP) address that is made up of numbers. So far this attack has been limited to specific areas but is aimed to undermine Internet trust as the stability of DNS systems drives the global economics.

The reason the DNS is attacked/hacked is because it is a global address book that changes Internet names into IP addresses that computers recognise and these can be used to invade systems and then hackers can steal confidential data and monitor and disrupt communications. This can easily cause problems for any organisation be it commercial, government or military. 

These attacks seem to be clearly focused on stealing private and secret information to gain access to particular government and commercial systems and seems to be part of a government spy activity.

There have also been DDoS, which are Distributed Denial of Service attacks such as one that hit Ecuador after the arrest of Julian Assange. This attack took down a number of commercial banking and government websites. 

These types of attack are often being sponsored by governments and are similar to state run piracy or privateering, which is used so that governments can claim that the crime is committed by hacker pirates and not a government organisations.

Similar to the Paris Declaration Respecting Maritime Law of April 1856, which was aimed to abolish privateering and was signed by 55 countries, we now need a similar agreement on cyberteering.  

By Alfred Rolington. CEO and c-founder of Cyber security Intelligence

You Might Also Read: 

Neither US, Russia Or China Will Sign Macron's Cyber Pact:

Russia Will Build A Separate Internet Directory:

 

« Five Reasons To Learn Cyber Security
Ransomware & Malware Make Way For New Attack Vectors »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

SecurityScorecard

SecurityScorecard

SecurityScorecard provides the most accurate security ratings & continuous risk monitoring for vendor and third party risk management.

Hitachi Systems Security

Hitachi Systems Security

Hitachi Systems Security provides customized services for monitoring and protecting the most critical and sensitive IT assets in our clients’ infrastructures 24/7.

Sapien Cyber

Sapien Cyber

Sapien Cyber is an Australian company bringing leading-edge cyber security and threat intelligence solutions.

Morphus Information Security

Morphus Information Security

Morphus is an information security company providing Red Team, Blue Team and GRC services as well as conducting research in cybersecurity and threat analysis.

Rostelecom Solar

Rostelecom Solar

Rostelecom-Solar is a Cyber Security Company, providing software and managed detection and response (MDR) services to protect critical information from advanced cyber threats.

Involta

Involta

Involta orchestrates IT transformation journeys using well-defined and rigorous processes to deliver hybrid cloud solutions, consulting and data center services tailored to our clients’ needs.

Digital Security by Design (DSbD)

Digital Security by Design (DSbD)

Digital Security by Design is an initiative supported by the UK government to transform digital technology and create a more resilient, and secure foundation for a safer future.

Dig Security

Dig Security

Dig Security offers the first data detection and response (DDR) solution, providing real-time visibility, control and protection of your data assets across any cloud.

Diversified Search Group - Alta Associates

Diversified Search Group - Alta Associates

Diversified Search Group is an industry leader in recruiting diverse, inclusive and transformational leadership for clients.

ECIT

ECIT

ECIT is your preferred provider of finance and IT services. We believe in the value of combining financial and IT services to streamline and improve the operation of your business.

Beround

Beround

Beround is an IT consultancy firm specialized in software testing.

DACTA Global

DACTA Global

DACTA was established with the aim of simplifying the perception of complexity surrounding digital security challenges and solutions.

JustunSecure

JustunSecure

JustunSecure is dedicated to promoting information technology and cybersecurity in Africa.

Dynamic Standards International (DSI)

Dynamic Standards International (DSI)

Dynamic Standards International is a global standards development organization which develops certifiable ‘dynamic standards’ that pace with fast-evolving landscapes.

Emergence Insurance

Emergence Insurance

Emergence is an insurance underwriting agency, focused on providing insurance solutions to help protect businesses and families against their cyber risks.

ecfirst

ecfirst

ecfirst's mission is to establish AI platforms and service capabilities to assess and manage client compliance with global mandates on a continual basis to secure business data and assets.