Thursday, May 19, 2016

Cyber Conflicts: Quiz 4 - Cyberwarfare and International Law

The quiz for this week is also easy and interesting. This is easy to solve, however, if you require any help let me know in the comment.



1. What does the terminology jus ad bellum refer to?
  • Acronym that identifies specific international war treaties
  • Principles that can be used to justify going to war
  • Principles used to include laws of war into cyber security
  • Laws adopted in the East and West for cyber warfare
2. Jus ad bellum principles are included in the following document:
  • International Arms Conflict Law
  • Rights to go to War Law
  • Laws of International Conflicts
  • Humanitarian Law of the UN
  • United Nations Charter
3. International Humanitarian Law prohibits countries from deciding to enter a war that causes considerable damage.
  • True
  • False


4. One of the main issues with cyberwarfare is that there is _____________ in the _____________ of attacks.
  • espionage; majority
  • data theft; minority
  • ambiguity; attribution
  • simplicity; majority
5. Select the types of attacks in which attribution has been a prevalent problem:
  • Attacks through the Internet
  • Attacks through malware preloaded in hardware/software
  • Attacks breaking confidence building measures
  • Cyberterrorist attacks on critical infrastructure
  • None of the above
6. What is an important reason for difficulties in international agreement on cyber security?
  • Differences in legal norms
  • Different definitions of crime
  • Lack of agreement on data access
  • Jourisdicational boundaries and sovereingty
  • All of the above
7. What is the main point of contention regarding the Council of Europe Convention on Cybercrime?
  • Computer and data access for countries across jurisdictional lines
  • Cooperation to address attacks over country lines
  • The inclusion of Russia and Japan as potential disruptors for the agreement
  • None of the above


8. Although attribution it is difficult, style of coding, hints about original language of hackers, purpose of attack and other analytical techniques allow us to make good educated guesses about source of attacks.
  • False
  • True
9. Below are typical actions to establish Confidence Building Measures, except:
  • Establishing prohibited weapons/targets
  • Exchange of personnel and joint exercises
  • Free movement of citizens
  • Exchange of information about assets
  • Communication mechanisms
10. All below are types of measures that can be used for confidence building, except:
  • Transparency
  • Constraint
  • Juridification
  • Verification
  • Communication

33 comments:

  1. could you send the responses to pessengersmell@gmail please? thanks

    ReplyDelete
  2. Please post the answers to ranjota@gmail.com

    ReplyDelete
  3. Please post the answers to ranjota@gmail.com

    ReplyDelete
  4. Providing all the answers directly is not what I intend to do. But if you are looking for specific answers we can discuss here. Thank you for your comments.

    ReplyDelete
    Replies
    1. Then why the fuck had u started this blog if you dont even want to answer those questions. Fuck you.... mother fucker.... Can't we read those questions on the coursera website.. we wanted answers that's why we searched for them on google and found your blog.. if you dont even want to answer those questions then suck my dick and of all the people here.

      Delete
    2. Exactly cocksucker....!!!

      Delete
    3. Lol study you asshats

      Delete
  5. Dear sir please sent me all answers on my email pls requested aman.faheem17@gmail.com

    ReplyDelete
  6. 1. What does the terminology jus ad bellum refer to?

    Principles that can be used to justify going to war

    ReplyDelete
    Replies
    1. hello friends, can u send me answers at andrija6600@yahoo.com tyyyy

      Delete
  7. could you send the answers to avasilyev1997@gmail.com? tnx

    ReplyDelete
  8. 1. Principles that can be used to justify going to war.
    2. United Nations Charter.
    3. true
    4. ambiguity; attribution
    5.Attacks through the Internet
    Attacks through malware preloaded in hardware/software
    6. All Above
    7. Computer and data access for countries across jurisdictional lines
    8. true
    9.
    10. Juridification

    ReplyDelete
  9. Recent times when net has so often gossip mongering and clog; your proportion really refreshes me. IT Support London

    ReplyDelete
  10. This comment has been removed by the author.

    ReplyDelete
  11. control of essential processes in manufacturing, banking, and communications to networked computers. cyber security course in hyderabad

    ReplyDelete
  12. Easily, the article is actually the best topic on this registry related issue. I fit in with your conclusions and will eagerly look forward to your next updates. dui lawyer

    ReplyDelete
  13. The next time I read a blog, I hope that it doesnt disappoint me as much as this one. I mean, I know it was my choice to read, but I actually thought you have something interesting to say. All I hear is a bunch of whining about something that you could fix if you werent too busy looking for attention. DUI Defense Lawyer

    ReplyDelete
  14. Going to graduate school was a positive decision for me. I enjoyed the coursework, the presentations, the fellow students, and the professors. And since my company reimbursed 100% of the tuition, the only cost that I had to pay on my own was for books and supplies. Otherwise, I received a free master’s degree. All that I had to invest was my time. Application for Unlawful Termination

    ReplyDelete
  15. Thank you for your post, I look for such article along time, today i find it finally. this post give me lots of advise it is very useful for me. info poker indonesia

    ReplyDelete
  16. 360DigiTMG Provides ethical hacking courses in hyderabad with 100% Placement assurance. India's leading training provider. Get IBM certification and UTM certification from Malaysia. ethical hacking training

    ReplyDelete
  17. I read a lot of stuff and i found that the way of writing to clearifing that exactly want to say was very good so i am impressed and ilike to come again in future..cybersecurity

    ReplyDelete
  18. Excellent information on your blog, thank you for taking the time to share with us. Amazing insight you have on this, it's nice to find a website that details so much information about different artists.cyber security consultant

    ReplyDelete
  19. I truly like your interpretation of the issue. I now have an unmistakable thought on what this matter is about.. dark0de market url

    ReplyDelete
  20. Knowing what positions one might be qualified for is only one aspect of determining whether the courses are worth the time and money. CCNA Training in Pune

    ReplyDelete
  21. I really appreciate this wonderful post that you have provided for us. I assure this would be beneficial for most of the people. read here

    ReplyDelete
  22. Thank you for very usefull information.. http://frouharlaw.com/

    ReplyDelete
  23. In my view, Xeone is the top choice for online trading. Its platform offers a seamless trading experience, combining advanced technology with user-friendly features. With Xeone, traders can access a wide range of financial markets, execute trades quickly and securely, and benefit from competitive pricing and reliable customer support. Overall, Xeone stands out as the best online trading company, providing traders with the tools and resources they need to succeed in the ever-evolving world of finance. best platform for online trading





    ReplyDelete