وبلاگ

توضیح وبلاگ من

حقوق بین‌الملل بشردوستانه و حملات سایبری- قسمت ۴۶

 
تاریخ: 20-07-00
نویسنده: فاطمه کرمانی

۵۱- http://cgsc.cdmhost.com/cgi-bin/ showfile.exe?CISOROOT=/p4013coll2&CISOPTR=274&filename=275.pdf
۵۲- http://www.npr.org/templates/story/story.php?storyId=130023318.
Abstract
According to the definition provided in this study, the concept of ‘Cyber Attack’ , new kind of cyber attack is the use of cyberspace in international relations that he highly talented creating fundamental changes in the field of modern conflicts, and that’s why the international community has created a new challenge ,and because of the increasing dependency on cyberspace governmental organizations, on the other hand the implementation of these operations is much easier for attackers and on the other hand, deal with such attacks, the government has a lot of technical and legal problems.
For this reason, despite the potential cyber attacks capable of lethal and cause severe damage, that “Are the rules of International Humanitarian Law applicable to cyber attacks or not?", International law has become a major challenge.
The study aimed to evaluate the rules of international humanitarian law, also examined the comments for and against and finally to the conclusion that most lawyers think, however, that these provisions do not cover all the cyber war and cyber attack.
However, due to the philosophy of humanitarian law, protect the civilian population and other principles such as the principle of proportionality and distinction considering, therefore, the rules still apply, and where there are no rules of customary international humanitarian law and principles such as the need to invoke ‘Martens Clause’ and the particular situation and implement international humanitarian law applied.
But due to lack of unity of the international community and the ambiguity of the implementation of these principles and rules, revised the current rules under a convention or international treaty, is required.
Key Words: Cyberspace, Computer Networks, Cyber Operations, Cyber Attacks, Jus ad bellum, Self Defense,
The Law of Armed Conflicts, International Humanitarian Law, Jus in bello, Distinction, Proportionality.
Payame Noor University
Thesis Submitted for the Award of Ph.D
Department of Law
International Humanitarian Law
and
Cyber Attacks
Supervisor :
Dr. Ali Reza Hojjatzadeh
Advisor 1:
Dr. Pouria Askari
Advisor 2:
Dr. Mohammad Taghi Rezaee
By :
Afshin Jafari
August 2015
- Sputnik. ↑
- United states’ Department of Defence (DOD). ↑
- Advanced Research Project Agency (ARPA). ↑
- ARPAnet. ↑

- خلیق، غلامرضا، رایانه کار ، انتشارات سازمان آموزش فنی و حرفه ای کشور، تهران، ۱۳۸۵، صص: ۱۲-۸٫ ↑
- NIC- Network Interface Card. ↑
- Transmission Medium. ↑
- Network Operating System. ↑
- Server. ↑
- خلیق،غلامرضا ؛پیشین ؛ صص:۱۴-۱۲٫ ↑
- Peer- to- Peer. ↑
- Server- Based. ↑
- Client Server. ↑
- Star Topology. ↑
- Concentrator.
هاب ( Hub ) یک قطعه سخت‌افزاری است که برای اتصال ایستگاه‌های کاری به شبکه که معمولاً شبکه‌های محلی می‌باشند مورد استفاده واقع می‌گردد. هاب معمولاً دارای چند درگاه ورودی و خروجی است که اطلاعات از طریق آن‌ ها می‌تواند به هاب وارد و یا خارج گردد. با ورود یک بسته اطلاعاتی به یک درگاه، این اطلاعات به صورت خودکار در سایر در گاه ها نیز کپی می‌گردد تا تمامی ایستگاه‌های شبکه آن را مشاهده، و در صورت لزوم آن را دریافت نمایند. ↑
پایان نامه - مقاله - پروژه
- Ring Topology. ↑
- International Business Machine,(IBM). ↑
- Bus Topology. ↑
- Mesh Topology. ↑
- Local Area Network, (LAN). ↑
- Metropolitan Area Network,(MAN). ↑
- Wide Area Network,(WAN). ↑
- خلیق،غلامرضا ؛ پیشین ؛ ص:۱۵٫ ↑


فرم در حال بارگذاری ...

« بررسی حقوقی رهن اموال اعتباری- قسمت ۶تحلیل ساختاری و زیبایی‌شناسی زیورآلات آبگینه معاصر ایران و بررسی شرایط حضور آن در بازارهای جهانی- قسمت ۳۶ »
 
مداحی های محرم