Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 1 of 1
Full-Text Articles in Law
Verification Methods In Cyber Attack Treaties, Grant Hodgson
Verification Methods In Cyber Attack Treaties, Grant Hodgson
Grant Hodgson
The fundamental differences between cyber weapons and traditional military weapons present challenges to verification techniques used in the past. This paper will discuss the challenges in constructing, implementing, and verifying a cyberattack treaty. Part I, will discuss the nature of cyberattacks and what makes them difficult for verification purposes. Part II will describe techniques that have previously been used to verify other treaties. Each technique is evaluated for its potential efficacy when applied to cyberattacks.