WWWMDs: Cyber-attacks against infrastructure in domestic anti-terror laws

被引:5
|
作者
Hardy, Keiran [1 ]
机构
[1] Univ New S Wales, Fac Law, Gilbert Tobin Ctr Publ Law, Sydney, NSW, Australia
关键词
Cyber-attacks; Electronic systems; Infrastructure; Definitions of terrorism; Anti-terror legislation;
D O I
10.1016/j.clsr.2011.01.008
中图分类号
D9 [法律]; DF [法律];
学科分类号
0301 ;
摘要
This article compares and contrasts the legislation that would be used to prosecute acts of cyber-terrorism in five western democracies: Australia, the United Kingdom, Canada, New Zealand and the United States. It argues that each of the four Commonwealth jurisdictions sets too low a threshold for prosecuting acts of cyber-terrorism against electronic and other infrastructure systems. By contrast, the United States has enacted more finely calibrated legislation that sets a much higher threshold for acts of cyber-terrorism deserving life imprisonment. (C) 2011 Keiran Hardy. Published by Elsevier Ltd. All rights reserved.
引用
收藏
页码:152 / 161
页数:10
相关论文
共 50 条
  • [41] Enhanced robust frequency stabilization of a microgrid against simultaneous cyber-attacks
    Kerdphol, Thongchart
    Ngamroo, Issarachai
    Surinkaew, Tossaporn
    ELECTRIC POWER SYSTEMS RESEARCH, 2024, 228
  • [42] Cyber-attacks against cyber-physical power systems security: State estimation, attacks reconstruction and defense strategy
    Su, Qingyu
    Wang, Handong
    Sun, Chaowei
    Li, Bo
    Li, Jian
    APPLIED MATHEMATICS AND COMPUTATION, 2022, 413
  • [43] Decomposition and sequential-AND analysis of known cyber-attacks on critical infrastructure control systems
    Maynard, Peter
    McLaughlin, Kieran
    Sezer, Sakir
    JOURNAL OF CYBERSECURITY, 2020, 6 (01): : 1 - 20
  • [44] Optimal defense resource allocation against cyber-attacks in distributed generation systems
    Mo, Huadong
    Xiao, Xun
    Sansavini, Giovanni
    Dong, Daoyi
    PROCEEDINGS OF THE INSTITUTION OF MECHANICAL ENGINEERS PART O-JOURNAL OF RISK AND RELIABILITY, 2024, 238 (06) : 1302 - 1329
  • [45] Observer-based adaptive ISMC for connected vehicles against cyber-attacks
    Yue, Wei
    Shen, Hongxia
    Guo, Xiangjun
    Wang, Liyuan
    MEASUREMENT & CONTROL, 2023, 56 (3-4): : 638 - 653
  • [46] Economic Information Warfare: Classifying Cyber-Attacks Against Commodity Value Chains
    van Niekerk, Brett
    PROCEEDINGS OF THE 14TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2019), 2019, : 448 - 456
  • [47] The Countermeasure Strategy Based on Big Data against North Korean Cyber-attacks
    Lee, Yong-joon
    Kwon, Hyuk-jin
    Lee, Jae-il
    Shin, Dong-kyoo
    KOREAN JOURNAL OF DEFENSE ANALYSIS, 2018, 30 (03): : 437 - 454
  • [48] Multivariate Gaussian-Based False Data Detection Against Cyber-Attacks
    An, Yu
    Liu, Dong
    IEEE ACCESS, 2019, 7 : 119804 - 119812
  • [49] Process Control Cyber-Attacks and Labelled Datasets on S7Comm Critical Infrastructure
    Rodofile, Nicholas R.
    Schmidt, Thomas
    Sherry, Sebastian T.
    Djamaludin, Christopher
    Radke, Kenneth
    Foo, Ernest
    INFORMATION SECURITY AND PRIVACY, ACISP 2017, PT II, 2017, 10343 : 452 - 459
  • [50] Resilient Countermeasures Against Cyber-Attacks on Self-Driving Car Architecture
    Qurashi, Junaid M. M.
    Jambi, Kamal
    Alsolami, Fawaz
    Eassa, Fathy E. E.
    Khemakhem, Maher
    Basuhail, Abdullah
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2023, 24 (11) : 11514 - 11543