East-West Institute draws up proposals for cyberwar rules of engagement

Cyber experts at the annual Munich Security Conference are to propose that global rules of engagement are established to cope with cyber weapons.

Cyber experts at the annual Munich Security Conference are to propose that global rules of engagement are established to cope with cyber weapons.

Conference atendees include UK Prime Minister David Cameron, German Chancellor Angela Merkel, US Secretary of State Hillary Clinton and Russian Foreign Minister Sergei Lavrov.

The proposal has been drawn up by the East-West Institute in New York and describes rendering the Geneva and Hague conventions in cyberspace, according to the BBC.

According to the institute, ambiguity about what constitutes cyber conflict is delaying international policy to deal with it.

The draft document calls for steps to protect zones that run facilities such as hospitals or schools, to distinguish between military and civilian targets, to set rules for retaliatory attacks, and to define a "nation state" in the context of cyberspace.

A recent report on cyber security published by the Organisation for Economic Co-operation and Development said although very few single cyber-related events have the capacity to cause global shock, governments still need to make detailed preparations to withstand and recover from a wide range of unwanted cyber events, both accidental and deliberate.

The report was compiled by Peter Sommer, visiting professor at the London School of Economics, and Ian Brown of the Oxford Internet Institute, University of Oxford.

Read more on Hackers and cybercrime prevention

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

SearchCIO

SearchSecurity

SearchNetworking

SearchDataCenter

  • How do I size a UPS unit?

    Your data center UPS sizing needs are dependent on a variety of factors. Develop configurations and determine the estimated UPS ...

  • How to enhance FTP server security

    If you still use FTP servers in your organization, use IP address whitelists, login restrictions and data encryption -- and just ...

  • 3 ways to approach cloud bursting

    With different cloud bursting techniques and tools from Amazon, Zerto, VMware and Oracle, admins can bolster cloud connections ...

SearchDataManagement

Close