Internet SOS – Save our systems

The Chinese Army is believed to be the prime suspect in the attack on Google’s email infrastructure and servers.

The ability to disable anything: “From the power grids to the Stock Market,” say Duncan B. Hollis and David G. Post of the National Law Journal. “Thicker firewalls and better mechanisms to detect and repel cyberspace attack strategy”. How to defend the military, private, commercial and global infrastructure (s) is one of the main concerns of cyberspace attack problems.

The captain of a tanker requesting help sent an SOS via wireless radio. The call was heard almost immediately. A helicopter was also dispatched to the offshore vessel that initially received the call. The pirate ships were descending on the unfortunate vehicle, an Indian tanker.

The pirate ships aborted their attack for fear of the helicopter and the arriving rescue ship. The receipt of an SOS by international law requires its receipt by maritime (also air) vessels to provide assistance “at all possible speed”. This particular incident occurred off the coast of Somalia in January 2009. What about cyberspace assistance tasks? An emergency call or distress signal from the captains requires immediate response or assistance. In today’s world of cybernetics, hyperlinks and the transmission of information and data (transport) … legal problems arise in the assistance and protection of liability in and on the Internet: a virtual sea. The new type of pirate is here to challenge and threaten everyone with his “new form of attack (s)”. The hacking of more than a million computers that found Internet access blocked was ordered by the hacking attack. Internet networks and intranets also became vulnerable. The cyberattack made headlines in newspapers around the world. Government network operations, emergency telephone connections, electronic banking services, hospitals, colleges and universities suffered major communications and transmission disruptions in 2007.

The compromise of these networks and millions of connection nodes has suffered repeated attacks. It has also been reported that dozens of the military have combined their forces and created what is known as “Cyberforce.”

Security measures, in many cases, challenge hackers to improve their techniques while attacking vulnerable “Open Networks”. Identification of attackers’ locations arises from the fabric of the Internet. It is almost impossible to enforce the “criminal laws of cyberspace. Military” laws of war “are not so easily enforced when it comes to law enforcement in cyberspace; the tools are simply instrumental protection for” Internet users. ” This recognition can therefore be quite effective in combating hackers. Entities in a position to help would have the opportunity to respond to the sender of the SOS. Attackers could be separated from users who need it. Attackers could be traced back to their source (s) thus nullifying further interference from the source of the cyber attack.

Decisions to help come only from providers who want to use the help resources. Holding cyberspace attackers accountable for their destruction / disruption is not an easy task. All providers can do is keep the attack to a minimum and provide support based on availability. SOS can be heard in cyberspace. Most entities, agencies, and businesses “in the cloud” are able to defend their intranets and quasi-networks from major hacker attacks with many firewall and protection tools. It does not mean that the law cannot or does not want to intervene, especially when defensive and / or preventive measures have been implemented.

The point is, Internet users can and should expect and receive help from Internet police. The village in general is or at least should be involved in the prevention and notification of cyberspace attacks.

Author: admin

Leave a Reply

Your email address will not be published. Required fields are marked *