ejecip Open Access Journal

European Journal of Emerging Cybersecurity and Information Protection

eISSN: Applied
Publication Frequency : 2 Issues per year.

  • Peer Reviewed & International Journal
Table of Content
Issues (Year-wise)
Loading…

Open Access iconOpen Access

ARTICLE

NAVIGATING THE DIGITAL MINEFIELD: A SYSTEMATIC REVIEW OF COLLATERAL DAMAGE IN CYBER WARFARE AND ITS MITIGATION

1 Department of Computer Science, University of Cape Town, South Africa
2 Faculty of Computational Mathematics and Cybernetics, Lomonosov Moscow State University, Russia

Citations: Loading…
ABSTRACT VIEWS: 33   |   FILE VIEWS: 16   |   PDF: 16   HTML: 0   OTHER: 0   |   TOTAL: 49
Views + Downloads (Last 90 days)
Cumulative % included

Abstract

Offensive cyber operations (OCOs) have rapidly evolved into a critical component of modern statecraft and conflict, offering diverse capabilities ranging from intelligence gathering to the disruption and destruction of adversary systems. However, the inherent characteristics of cyberspace—its pervasive interconnectedness, intricate complexity, and often ambiguous nature—introduce profound challenges, particularly concerning collateral damage. This comprehensive systematic literature review delves into the conceptualization, ramifications, and strategies for mitigating unintended harm arising from OCOs. By synthesizing insights from academic scholarship, military doctrine, and policy discourse, this review categorizes the multifaceted forms of collateral damage, scrutinizes the legal and ethical frameworks designed to govern such effects, and identifies prevailing approaches and future trajectories for minimizing inadvertent harm. The findings unequivocally highlight the urgent necessity for robust assessment methodologies, enhanced international collaboration, and the responsible development and deployment of cyber capabilities to safeguard non-combatant civilians and vital infrastructure from the far-reaching and often pervasive ripple effects of contemporary cyber warfare.


Keywords

Cybersecurity, Cyber Warfare, Offensive Cyber Operations, Collateral Damage

References

1. Aiyer, B.; Caso, J.; Russell, P.; Sorel, M. Mckinsey: New Survey Reveals $2 Trillion Market Opportunity for Cybersecurity Technology and Service Providers. 2022. Available online: https://www.mckinsey.com/capabilities/risk-and-resilience/our-insights/cybersecurity/new-survey-reveals-2-trillion-dollar-market-opportunity-for-cybersecurity-technology-and-service-providers (accessed on 30 January 2024).

2. IBM Security; the Ponemon Institute. Cost of a Data Breach Report 2022. 2022. Available online: https://www.ibm.com/downloads/cas/3R8N1DZJ (accessed on 31 January 2024).

3. Hanson, F.; Uren, T. Australia’s Offensive Cyber Capability. 2018. Available online: https://www.aspi.org.au/report/australias-offensive-cyber-capability (accessed on 31 January 2024).

4. Farwell, J.P.; Rohozinski, R. Stuxnet and the Future of Cyber War. Survival 2011, 53, 23–40.

5. U.S. Department of Justice. Three North Korean Military Hackers Indicted in Wide-Ranging Scheme to Commit Cyberattacks and Financial Crimes Across the Globe. 2022. Available online: https://www.justice.gov/opa/pr/three-north-korean-military-hackers-indicted-wide-ranging-scheme-commit-cyberattacks-and (accessed on 1 February 2024).


How to Cite

NAVIGATING THE DIGITAL MINEFIELD: A SYSTEMATIC REVIEW OF COLLATERAL DAMAGE IN CYBER WARFARE AND ITS MITIGATION. (2024). European Journal of Emerging Cybersecurity and Information Protection, 1(01), 77-94. https://parthenonfrontiers.com/index.php/ejecip/article/view/134

Related articles

Share Link