Wanted: An International Cyber Security Law

There is an increasing amount of government backed international hacking with the aim to steal government and commercial secrets. And this is often done using DNS attacks/hacks. The Domain Name System (DNS) is a central part of the Internet, providing a way to match names, such as a website that you are looking for, to the numbers that are the address for the website. 

Anything connected to the Internet - laptops, tablets, mobile phones, websites - has an Internet Protocol (IP) address that is made up of numbers. So far this attack has been limited to specific areas but is aimed to undermine Internet trust as the stability of DNS systems drives the global economics.

The reason the DNS is attacked/hacked is because it is a global address book that changes Internet names into IP addresses that computers recognise and these can be used to invade systems and then hackers can steal confidential data and monitor and disrupt communications. This can easily cause problems for any organisation be it commercial, government or military. 

These attacks seem to be clearly focused on stealing private and secret information to gain access to particular government and commercial systems and seems to be part of a government spy activity.

There have also been DDoS, which are Distributed Denial of Service attacks such as one that hit Ecuador after the arrest of Julian Assange. This attack took down a number of commercial banking and government websites. 

These types of attack are often being sponsored by governments and are similar to state run piracy or privateering, which is used so that governments can claim that the crime is committed by hacker pirates and not a government organisations.

Similar to the Paris Declaration Respecting Maritime Law of April 1856, which was aimed to abolish privateering and was signed by 55 countries, we now need a similar agreement on cyberteering.  

By Alfred Rolington. CEO and c-founder of Cyber security Intelligence

You Might Also Read: 

Neither US, Russia Or China Will Sign Macron's Cyber Pact:

Russia Will Build A Separate Internet Directory:

 

« Five Reasons To Learn Cyber Security
Ransomware & Malware Make Way For New Attack Vectors »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

VMworld

VMworld

VMworld is a global conference for virtualization and cloud computing, including associated security issues.

SafeBreach

SafeBreach

SafeBreach's platform simulates hacker breach methods across the entire kill chain to identify breach scenarios in your environment before an attacker does.

Hypersecu Information Systems

Hypersecu Information Systems

Hypersecu Information Systems, Inc. is a solution provider dedicated to multi-factor authentication, public key infrastructure and software copyright protection.

HorizonIQ

HorizonIQ

HorizonIQ (formerly Internap Corp / INAP) maximizes efficiency and innovation with flexible infrastructure solutions.

R2S Technologies

R2S Technologies

R2S can help you implement a cyber security framework to ensure your business is more resilient towards the growing threat of cyber crime. We provide Web and Mobile Application Security Assessment..

DestructData

DestructData

DestructData is a leading independent provider of End of Life data destruction/security solutions.

Hawk Network Defense

Hawk Network Defense

HAWK.io is the First Fully Automated, Multi-Tenant, Cloud-Based, MDR Service Company.

usecure

usecure

usecure is a global provider of computer-based cyber security awareness training, offering the market’s most time-efficient, cost-effective and admin-lite solution for reducing insider threats.

Tugboat Logic

Tugboat Logic

Tugboat Logic was created to address the skills and expertise gap in the security and compliance industry. Our goal is to simplify and automate information security management for every enterprise.

Celcom

Celcom

Celcom is the oldest mobile telecommunications provider in Malaysia, providing solutions and services to consumers and businesses.

Strata Identity

Strata Identity

Strata is pioneering identity orchestration to unify on-premises and cloud-based authentication and access systems for consistent identity management in multi-cloud environments.

Turk Telekom

Turk Telekom

Turk Telekom is the first integrated telecommunications operator in Turkey.

Anchor Technologies Inc (ATI)

Anchor Technologies Inc (ATI)

Anchor provides a full spectrum of cybersecurity services assisting our clients with all aspects of cybersecurity risk planning, identification, management, and monitoring.

ThreatER

ThreatER

ThreateER (formerly ThreatBlockr / Bandura Cyber) is a cybersecurity platform that provides active network defense by automating the discovery, enforcement, and analysis of cyber threats at scale.

CMIT Solutions

CMIT Solutions

CMIT Solutions is a recognized leader in Managed IT Services for businesses. We empower businesses like yours by providing innovative technology solutions, managed IT services and cybersecurity.

Twinstate Technologies

Twinstate Technologies

Twinstate Technologies specializes in cybersecurity, proactive IT, and hosted and on-premise voice solutions.