Nurt
Uploaded by
7 SLIDES
70 VUES
70LIKES

ppp

DESCRIPTION

nurikkkjhhb

1 / 7

Télécharger la présentation

ppp

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. ACTUAL INTERNATIONAL LEGAL PROBLEMS OF COMBATING CYBERTERRORISM ZHANABILOV NURTLEU

  2. RESEARCH OBJECTIVES AND RESEARCH QUESTIONS The research objectives will be: - to investigate and analyse the threat that cyberattacks and cyberterrorism pose to global peace and security; - to research and characterise the legal system governing cyber-attacks and cyber-terrorism; - to research and evaluate the risks associated with these attacks as weapons; - to research, examine, and review existing state practises as well as national and international legislation in order to ascertain the appropriate responses of victim states; - to suggest suitable legal actions to stop these assaults.

  3. - What is the problem and is it still relevant? Why? - Were there any similar studies made? What are their results? - What topics are covered in the literature, and what conclusions can be drawn from it? - Which theoretical model best supports the objectives of the research design? - Which approach is best for the examination of comparative case studies?

  4. METHODOLOGY To achieve research objectives will be used following methods as: - Descriptive research, since it will explain what a cyberattack and a cyberterrorist are; - Analytical research, because it will explain why these attacks pose a serious threat to global peace and security and how they are treated as weapons; - Reform-oriented because it will suggest solutions to lessen this danger

  5. Aenean ullamcorper tortor THANK YOU

  6. DATA For this research both primary sources and secondary sources will be used. It would be necessary to conduct a thorough analysis of the laws, case laws, books, articles, legal provisions, international treaties, scholarly journals, research papers, and literature in other publications that are linked to cyber- attack and cyber-terrorism. The qualitative method would be employed to gather the data for this study.

  7. CONCLUSION Cyberterrorism and cyberattacks breach the UN Charter's values and pose a threat to global peace and security. These principles forbid states from enforcing a state's geographical integrity, political independence, or state sovereignty. The actions taken by states in cyberspace are under the purview of state sovereignty and the non-intervention principle. If a cyberattack results in severe physical damage and harm to people, it qualifies as an armed attack and is therefore considered weaponry. These attacks would be considered self-defense because they cause such severe harm. To counter to these attacks conducted by another state, the states should establish certain methods and measures.

More Related