Wanted: An International Cyber Security Law

There is an increasing amount of government backed international hacking with the aim to steal government and commercial secrets. And this is often done using DNS attacks/hacks. The Domain Name System (DNS) is a central part of the Internet, providing a way to match names, such as a website that you are looking for, to the numbers that are the address for the website. 

Anything connected to the Internet - laptops, tablets, mobile phones, websites - has an Internet Protocol (IP) address that is made up of numbers. So far this attack has been limited to specific areas but is aimed to undermine Internet trust as the stability of DNS systems drives the global economics.

The reason the DNS is attacked/hacked is because it is a global address book that changes Internet names into IP addresses that computers recognise and these can be used to invade systems and then hackers can steal confidential data and monitor and disrupt communications. This can easily cause problems for any organisation be it commercial, government or military. 

These attacks seem to be clearly focused on stealing private and secret information to gain access to particular government and commercial systems and seems to be part of a government spy activity.

There have also been DDoS, which are Distributed Denial of Service attacks such as one that hit Ecuador after the arrest of Julian Assange. This attack took down a number of commercial banking and government websites. 

These types of attack are often being sponsored by governments and are similar to state run piracy or privateering, which is used so that governments can claim that the crime is committed by hacker pirates and not a government organisations.

Similar to the Paris Declaration Respecting Maritime Law of April 1856, which was aimed to abolish privateering and was signed by 55 countries, we now need a similar agreement on cyberteering.  

By Alfred Rolington. CEO and c-founder of Cyber security Intelligence

You Might Also Read: 

Neither US, Russia Or China Will Sign Macron's Cyber Pact:

Russia Will Build A Separate Internet Directory:

 

« Five Reasons To Learn Cyber Security
Ransomware & Malware Make Way For New Attack Vectors »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ExaGrid Systems

ExaGrid Systems

ExaGrid provides Tiered Backup Storage with a unique disk-cache Landing Zone, long-term retention repository, and scale-out architecture.

ManagedMethods

ManagedMethods

ManageMethods Cloud Access Monitor is the only Cloud Access Security Broker (CASB) that can be deployed in minutes, with no special training, and with no impact on users or networks.

Assured Enterprises

Assured Enterprises

Assured Enterprises provides comprehensive cyber risk identification, management and mitigation across all platforms.

Ekran System

Ekran System

Ekran System is an advanced insider threat detection solution for companies of any size.

Cyber Science

Cyber Science

Cyber Science is the flagship conference of C-MRiC, focusing on pioneering research and innovation in Cyber Situational Awareness, Social Media, Cyber Security and Cyber Incident Response.

Founder Shield

Founder Shield

Founder Shield is a data driven insurance brokerage focused excusively on rapidly evolving high-growth companies.

Passbase

Passbase

Passbase is building a full-stack identity verification engine backed by verified government documents.

Datacentrix

Datacentrix

Datacentrix provides end-to-end cybersecurity services for the operational technology (OT) and IT environments to monitor, assess and defend our customers' information assets.

SurePassID

SurePassID

SurePassID is a provider of highly secure, highly extensible multi-factor authentication (MFA) solutions.

Adversa AI

Adversa AI

Adversa's mission is to build trust in AI and protect AI from cyber threats, privacy issues, and safety incidents.

Bright Data

Bright Data

Bright Data Inc is the world’s #1 web data platform, enabling organizations to research, monitor, analyze data, and make better decisions.

Battery Ventures

Battery Ventures

Battery partners with talented founders and teams building category-defining businesses at all stages of growth.

Muscope Cybersecurity

Muscope Cybersecurity

Muscope CYSR platform performs a risk assessment and offers a comprehensive overview of the potential cyber attack risks.

Dropzone AI

Dropzone AI

Dropzone AI are creating a generational leap in SecOps by using AI to automate cyber expertise and tooling.

Port-IT

Port-IT

Port-IT is a leading partner in cybersecurity solutions tailored for the maritime industry.

American Binary

American Binary

American Binary is a Quantum Safe Networking (TM) and post-quantum encryption company.