Wanted: An International Cyber Security Law

There is an increasing amount of government backed international hacking with the aim to steal government and commercial secrets. And this is often done using DNS attacks/hacks. The Domain Name System (DNS) is a central part of the Internet, providing a way to match names, such as a website that you are looking for, to the numbers that are the address for the website. 

Anything connected to the Internet - laptops, tablets, mobile phones, websites - has an Internet Protocol (IP) address that is made up of numbers. So far this attack has been limited to specific areas but is aimed to undermine Internet trust as the stability of DNS systems drives the global economics.

The reason the DNS is attacked/hacked is because it is a global address book that changes Internet names into IP addresses that computers recognise and these can be used to invade systems and then hackers can steal confidential data and monitor and disrupt communications. This can easily cause problems for any organisation be it commercial, government or military. 

These attacks seem to be clearly focused on stealing private and secret information to gain access to particular government and commercial systems and seems to be part of a government spy activity.

There have also been DDoS, which are Distributed Denial of Service attacks such as one that hit Ecuador after the arrest of Julian Assange. This attack took down a number of commercial banking and government websites. 

These types of attack are often being sponsored by governments and are similar to state run piracy or privateering, which is used so that governments can claim that the crime is committed by hacker pirates and not a government organisations.

Similar to the Paris Declaration Respecting Maritime Law of April 1856, which was aimed to abolish privateering and was signed by 55 countries, we now need a similar agreement on cyberteering.  

By Alfred Rolington. CEO and c-founder of Cyber security Intelligence

You Might Also Read: 

Neither US, Russia Or China Will Sign Macron's Cyber Pact:

Russia Will Build A Separate Internet Directory:

 

« Five Reasons To Learn Cyber Security
Ransomware & Malware Make Way For New Attack Vectors »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

WEBINAR: How To Build And Implement An Effective Endpoint Detection And Response Strategy

WEBINAR: How To Build And Implement An Effective Endpoint Detection And Response Strategy

Join this webinar to learn how the cloud threat landscape is evolving and organizations are deploying more advanced and capable security controls at scale.

Cyber Conflict Studies Association (CCSA)

Cyber Conflict Studies Association (CCSA)

Cyber Conflict Studies Association (CCSA) is a non-profit organization dedicated to leading a diversified research agenda in the field of cyber conflict.

Maryville Online - Cybersecurity Program

Maryville Online - Cybersecurity Program

The Cybersecurity Program at Maryville Online is designed to help students reach opportunities in cybersecurity leadership and management through an entirely online curriculum.

Somansa

Somansa

Somansa is a global leader in Data Security and Compliance solutions designed to protect valuable company information from leakage and help meet regulatory compliance requirements.

Avatao

Avatao

Avatao is an online training platform for building secure software, offering a rich library of hands-on IT security exercises for software engineers to teach secure programming.

DynaRisk

DynaRisk

DynaRisk helps companies protect their staff, clients and supply chain from cyber threats by enabling people to take action for themselves.

Omada

Omada

Omada is a leading provider of IT security solutions and services for identity management and access governance.

Cyber Security Malta

Cyber Security Malta

Cyber Security Malta is part of Malta's National Cyber Security Strategy which aims to combat cybercrime, strengthen national cyber defence and provide cyber security awareness and education.

Cybersecurity Manufacturing Innovation Institute (CyManII)

Cybersecurity Manufacturing Innovation Institute (CyManII)

CyManII was established to create economically viable, pervasive, and inconspicuous cybersecurity in American manufacturing to secure the digital supply chain and energy automation.

ColorTokens

ColorTokens

ColorTokens Xtended ZeroTrust Platform protects from the inside out with unified visibility, micro-segmentation, zero-trust network access, cloud workload and endpoint protection.

BullGuard

BullGuard

BullGuard is an award-winning cybersecurity company focused on providing the consumer and small business markets with the confidence to use the internet in absolute safety.

Privacyware

Privacyware

Privacyware's ThreatSentry combines a state-of-the-art Web Application Firewall and port-level firewall with advanced behavioral filtering to block unwanted IIS traffic and web application threats.

HighPoint

HighPoint

HighPoint is a leading technology infrastructure solutions provider offering consultancy, solutions and managed services for network infrastructure and cybersecurity.

DeVry University - Cyber Security Degree

DeVry University - Cyber Security Degree

Explore the dynamic world of data protection with a hybrid or online cyber security degree specialization with DeVry's IT & Networking Bachelor's Degree.

Clear Thinking Solutions

Clear Thinking Solutions

Clear Thinking is an IT Solutions company specialising in secure & compliant technical services.

Trusted Cyber Solutions

Trusted Cyber Solutions

Trusted Cyber Solutions is an independent Cyber Security and Risk Management consultancy.

Telstra

Telstra

Telstra is one of the world's leading telecommunications and technology companies, offering a wider range of services from networks and cloud solutions to mobility and enterprise collaboration tools.