Wanted: An International Cyber Security Law

There is an increasing amount of government backed international hacking with the aim to steal government and commercial secrets. And this is often done using DNS attacks/hacks. The Domain Name System (DNS) is a central part of the Internet, providing a way to match names, such as a website that you are looking for, to the numbers that are the address for the website. 

Anything connected to the Internet - laptops, tablets, mobile phones, websites - has an Internet Protocol (IP) address that is made up of numbers. So far this attack has been limited to specific areas but is aimed to undermine Internet trust as the stability of DNS systems drives the global economics.

The reason the DNS is attacked/hacked is because it is a global address book that changes Internet names into IP addresses that computers recognise and these can be used to invade systems and then hackers can steal confidential data and monitor and disrupt communications. This can easily cause problems for any organisation be it commercial, government or military. 

These attacks seem to be clearly focused on stealing private and secret information to gain access to particular government and commercial systems and seems to be part of a government spy activity.

There have also been DDoS, which are Distributed Denial of Service attacks such as one that hit Ecuador after the arrest of Julian Assange. This attack took down a number of commercial banking and government websites. 

These types of attack are often being sponsored by governments and are similar to state run piracy or privateering, which is used so that governments can claim that the crime is committed by hacker pirates and not a government organisations.

Similar to the Paris Declaration Respecting Maritime Law of April 1856, which was aimed to abolish privateering and was signed by 55 countries, we now need a similar agreement on cyberteering.  

By Alfred Rolington. CEO and c-founder of Cyber security Intelligence

You Might Also Read: 

Neither US, Russia Or China Will Sign Macron's Cyber Pact:

Russia Will Build A Separate Internet Directory:

 

« Five Reasons To Learn Cyber Security
Ransomware & Malware Make Way For New Attack Vectors »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Radisys

Radisys

Radisys offers software, products, integrated systems, and professional services for communication service providers and telecom solution vendors.

Redcentric

Redcentric

Redcentric is a leading UK IT managed services provider. We deliver managed IT, cloud computing, data backup, information security services and managed networks.

NetMotion Software

NetMotion Software

NetMotion Software specializes in mobile performance management solutions to manage, secure and support the mobile enterprise.

OneVisage

OneVisage

Our award-winning 3DAuth digital identity platform turns any consumer mobile device into a real-time 3D facial scanner that securely authenticates the user in seconds.

Custodio Technologies

Custodio Technologies

Custodio Technologies was established as a Singaporean R&D Centre of Israel Aerospace Industries (IAI) in order to spearhead R&D activities in the field of cyber early warning.

Clavis Information Security

Clavis Information Security

Clavis is an Information Security company offering a complete portfolio of solutions from Pentesting and Security Assessments to Managed Security Services and Training.

ETSI

ETSI

ETSI is a European Standards Organization dealing with telecommunications, broadcasting and other electronic communications networks and services including cybersecurity.

Bellvista Capital

Bellvista Capital

Bellvista Capital connects entrepreneurs with capital and unmatched business expertise in the technology areas of Cloud Computing, Cyber Security and Data Analytics.

Inflexor Ventures

Inflexor Ventures

Inflexor Ventures is a technology focused venture capital firm that invests in early stage companies from seed to Series-A+ stages.

UST

UST

UST is a global provider of digital technology and transformation, IT services and solutions including managed security services.

QGroup

QGroup

QGroup has been re-designing the consultancy industry since 2012. We're a rapidly expanding group of consulting companies that deliver bespoke IT services including cybersecurity.

IoTeX

IoTeX

Building the connected world. IoTeX is a fast, secure, and decentralized platform that connects real world devices/data to the blockchain.

NewAE Technology

NewAE Technology

NewAE Technology is revolutionizing the hardware security market by making every engineer and designer aware of side-channel power analysis and glitching as important attack vectors.

OX Security

OX Security

OX is a DevOps software supply chain security solution. Teams can verify the integrity and security of every artifact using a pipeline bill of materials (PBOM).

Guardsman Cyber Intelligence (GCI)

Guardsman Cyber Intelligence (GCI)

GCI provides proven cyber intelligence solutions to protect your business against ever present physical and digital threats shadowing your online business.

Custocy

Custocy

Custocy is a unique collaborative AI technology that identifies sophisticated and unknown (zero-day) attacks.