ppp
nurikkkjhhb
ppp
E N D
Presentation Transcript
ACTUAL INTERNATIONAL LEGAL PROBLEMS OF COMBATING CYBERTERRORISM ZHANABILOV NURTLEU
RESEARCH OBJECTIVES AND RESEARCH QUESTIONS The research objectives will be: - to investigate and analyse the threat that cyberattacks and cyberterrorism pose to global peace and security; - to research and characterise the legal system governing cyber-attacks and cyber-terrorism; - to research and evaluate the risks associated with these attacks as weapons; - to research, examine, and review existing state practises as well as national and international legislation in order to ascertain the appropriate responses of victim states; - to suggest suitable legal actions to stop these assaults.
- What is the problem and is it still relevant? Why? - Were there any similar studies made? What are their results? - What topics are covered in the literature, and what conclusions can be drawn from it? - Which theoretical model best supports the objectives of the research design? - Which approach is best for the examination of comparative case studies?
METHODOLOGY To achieve research objectives will be used following methods as: - Descriptive research, since it will explain what a cyberattack and a cyberterrorist are; - Analytical research, because it will explain why these attacks pose a serious threat to global peace and security and how they are treated as weapons; - Reform-oriented because it will suggest solutions to lessen this danger
Aenean ullamcorper tortor THANK YOU
DATA For this research both primary sources and secondary sources will be used. It would be necessary to conduct a thorough analysis of the laws, case laws, books, articles, legal provisions, international treaties, scholarly journals, research papers, and literature in other publications that are linked to cyber- attack and cyber-terrorism. The qualitative method would be employed to gather the data for this study.
CONCLUSION Cyberterrorism and cyberattacks breach the UN Charter's values and pose a threat to global peace and security. These principles forbid states from enforcing a state's geographical integrity, political independence, or state sovereignty. The actions taken by states in cyberspace are under the purview of state sovereignty and the non-intervention principle. If a cyberattack results in severe physical damage and harm to people, it qualifies as an armed attack and is therefore considered weaponry. These attacks would be considered self-defense because they cause such severe harm. To counter to these attacks conducted by another state, the states should establish certain methods and measures.