Reference Hub7
A Vulnerability-Based Model of Cyber Weapons and its Implications for Cyber Conflict

A Vulnerability-Based Model of Cyber Weapons and its Implications for Cyber Conflict

Christian Czosseck, Karlis Podins
Copyright: © 2012 |Volume: 2 |Issue: 1 |Pages: 13
ISSN: 1947-3435|EISSN: 1947-3443|EISBN13: 9781466611474|DOI: 10.4018/ijcwt.2012010102
Cite Article Cite Article

MLA

Czosseck, Christian, and Karlis Podins. "A Vulnerability-Based Model of Cyber Weapons and its Implications for Cyber Conflict." IJCWT vol.2, no.1 2012: pp.14-26. http://doi.org/10.4018/ijcwt.2012010102

APA

Czosseck, C. & Podins, K. (2012). A Vulnerability-Based Model of Cyber Weapons and its Implications for Cyber Conflict. International Journal of Cyber Warfare and Terrorism (IJCWT), 2(1), 14-26. http://doi.org/10.4018/ijcwt.2012010102

Chicago

Czosseck, Christian, and Karlis Podins. "A Vulnerability-Based Model of Cyber Weapons and its Implications for Cyber Conflict," International Journal of Cyber Warfare and Terrorism (IJCWT) 2, no.1: 14-26. http://doi.org/10.4018/ijcwt.2012010102

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Throughout history, mankind has developed and employed novel weapons and countermeasures. Both offensive and defensive weapon systems are limited by the laws of nature. Consequently, military concepts and doctrines were designed by implicitly taking into account those limitations. The digital age has introduced a new class of weaponry that poses an initial challenge to the common understanding of conflict and warfare due to their different characteristics: cyber weapons. This article explores the crucial differences between the conventional weapon and cyber weapon domains, starting a debate as to what extent classical concepts and doctrines are applicable to cyberspace and cyber conflict. The authors propose a definition of cyber weapons being an instrument consisting primarily of data and knowledge, presenting them in the form of prepared and executed computer codes on or a sequence of user interactions with a vulnerable system. The authors describe a vulnerability-based model for cyber weapons and for cyber defence. This model is then applied to describe the relationship between cyber-capable actors (e.g. States). The proposed model clarifies important implications for cyber coalition-building and disarmament. Furthermore, it presents a general solution for the problem of the destruction of cyber weapons, i.e., in the context of cyber arms control.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.