Atnaujinkite slapukų nuostatas

El. knyga: Cybersecurity: Key Legal Considerations for the Aviation and Space Sectors

  • Formatas: 272 pages
  • Išleidimo metai: 09-Jul-2020
  • Leidėjas: Kluwer Law International
  • Kalba: eng
  • ISBN-13: 9789403501123
  • Formatas: 272 pages
  • Išleidimo metai: 09-Jul-2020
  • Leidėjas: Kluwer Law International
  • Kalba: eng
  • ISBN-13: 9789403501123

DRM apribojimai

  • Kopijuoti:

    neleidžiama

  • Spausdinti:

    neleidžiama

  • El. knygos naudojimas:

    Skaitmeninių teisių valdymas (DRM)
    Leidykla pateikė šią knygą šifruota forma, o tai reiškia, kad norint ją atrakinti ir perskaityti reikia įdiegti nemokamą programinę įrangą. Norint skaityti šią el. knygą, turite susikurti Adobe ID . Daugiau informacijos  čia. El. knygą galima atsisiųsti į 6 įrenginius (vienas vartotojas su tuo pačiu Adobe ID).

    Reikalinga programinė įranga
    Norint skaityti šią el. knygą mobiliajame įrenginyje (telefone ar planšetiniame kompiuteryje), turite įdiegti šią nemokamą programėlę: PocketBook Reader (iOS / Android)

    Norint skaityti šią el. knygą asmeniniame arba „Mac“ kompiuteryje, Jums reikalinga  Adobe Digital Editions “ (tai nemokama programa, specialiai sukurta el. knygoms. Tai nėra tas pats, kas „Adobe Reader“, kurią tikriausiai jau turite savo kompiuteryje.)

    Negalite skaityti šios el. knygos naudodami „Amazon Kindle“.

Cybersecurity' is a resourceful book which explores the current laws relevant to aviation and space cybersecurity and analyses them from a critical perspective. The growing connection between the aviation and space sectors and reliance on related technology make them more susceptible to potential cyberattacks. Consequently, cybersecurity is becoming a pressing concern that should be taken into consideration by stakeholders in both sectors. This progressive book takes an introductory approach to allow those unfamiliar with aviation and space law, including telecommunications, and/or cybersecurity to gain valuable insight into these areas, and the subsequent chapters delve deep into the gamut of relevant international and European Union (EU) laws, with specific attention to associated risks, existing legal provisions and the potential development of new rules.
About the Authors v
Foreword xv
List of Abbreviations
xvii
Acknowledgements xxi
Chapter 1 Introduction: Overview
1(14)
§1.01 General Introduction
1(5)
[ A] Cybersecurity in Aviation
3(1)
[ B] Cybersecurity in Outer Space
4(2)
[ C] Cybersecurity in Satellite Services
6(1)
§1.02 Aim of the Book
6(1)
§1.03
Chapter Break Down
7(8)
[ A]
Chapter 2: Definitions and Terminology
7(1)
[ B]
Chapter 3: Cyberattacks from an International Law Perspective
8(1)
[ C]
Chapter 4: Promotion of Cybersecurity and Combating Cybercrime in the EU
8(1)
[ D]
Chapter 5: Space (Law) and Cybersecurity
9(1)
[ E]
Chapter 6: Critical Infrastructure for Aviation and Space Activities: Satellite Communication and Navigation
10(1)
[ F]
Chapter 7: Public International Civil Aviation Law
11(1)
[ G]
Chapter 8: Aviation Liability in Cases of Cyberattacks
12(1)
[ H]
Chapter 9: Lessons Learned
12(3)
Chapter 2 Definitions and Terminology
15(26)
§2.01 Introduction
15(1)
§2.02 Relevant Cyber Terminology
16(10)
[ A] Cyberspace: Etymology, History and Main Characteristics
16(3)
[ B] Cybersecurity
19(1)
[ C] Cybersecurity in Aviation
20(1)
[ D] Cybersecurity in Outer Space
20(1)
[ E] Cyber Activities and Cyber Operations
21(2)
[ F] Cyber Threat
23(1)
[ G] Cyberattack
23(1)
[ H] Cybercrime
24(1)
[ I] Weapon and Cyberweapon
25(1)
§2.03 Relevant Aviation Terminology
26(4)
[ A] Aircraft
26(1)
[ B] Airspace
26(1)
[ C] Aviation Safety Versus Aviation Security
27(1)
[ D] Standards and Recommended Practices
28(1)
[ E] Interference in Aviation
29(1)
§2.04 Relevant Outer Space and Satellite Services Terminology
30(7)
[ A] Electromagnetic Attack
30(1)
[ B] Electromagnetic Interference
30(1)
[ C] Electromagnetic Spectrum
31(1)
[ D] Harmful Interference
31(1)
[ E] Jamming
31(1)
[ F] Launching State
32(1)
[ G] Malicious Cyber Activities Against Space Infrastructure
32(1)
[ H] Outer Space
33(1)
[ I] Space Activities
33(1)
[ J] Space Infrastructure
34(1)
[ K] Space Objects and Space Assets
35(2)
[ L] Spoofing
37(1)
§2.05 General Terms
37(4)
[ A] Critical Infrastructure
37(1)
[ B] Denial of Service
38(1)
[ C] Internet of Things
38(1)
[ D] Liability
39(1)
[ E] Malware
39(1)
[ F] Resilience of Information Systems
39(1)
[ G] Vulnerability
40(1)
Chapter 3 Cyberattacks from an International Law Perspective
41(24)
§3.01 Sources of Public International Law
42(3)
§3.02 Public International Law and Conflict: Jus Ad Bellum and Jus in Bello
45(7)
[ A] A Potential Digital Geneva Convention
47(2)
[ B] Convention on Cybercrime of the Council of Europe
49(2)
[ C] Tallinn Manual on International Law Applicable to Cyber Operations
51(1)
§3.03 Applicability of the Jus Ad Bellum to Cyberattacks
52(7)
[ A] Use or Threat of Use of `Cyber' Force
53(2)
[ B] From `Use of Cyber Force' to `Armed Cyber Attack'
55(1)
[ 1] Responding to an Armed Cyber Attack: Self-Defence
56(2)
[ 2] Responding to an Armed Cyber Attack: Security Council Authorisation
58(1)
§3.04 State Responsibility under International Law
59(2)
§3.05 International Regulation
61(2)
§3.06 Conclusion
63(2)
Chapter 4 Promotion of Cybersecurity and Combating Cybercrime in the EU
65(38)
§4.01 Introduction: EU and Cybersecurity Policy
65(12)
[ A] Early Regulatory and Policy Steps by the EU
65(4)
[ B] Cybersecurity Strategy of the EU
69(1)
[ 1] Cybersecurity Strategy of the EU: An Open, Safe and Secure Cyberspace
69(3)
[ 2] Revisiting the Cybersecurity Strategy of the EU
72(1)
[ C] Digital Single Market
73(1)
[ 1] Digital Single Market Strategy
73(2)
[ 2] Digital Single Market Review
75(1)
[ D] Tallinn Digital Summit
76(1)
§4.02 Primary and Secondary EU Legislation
77(16)
[ A] Article 222 TFEU
77(1)
[ B] Cybersecurity Legislation
78(1)
[ 1] NIS Directive
78(3)
[ 2] Directive on Attacks Against Information Systems
81(1)
[ 3] Blueprint for Large-Scale Cybersecurity Incidents and Crises
82(1)
[ C] Cybersecurity Certification
83(1)
[ 1] Cybersecurity Act
83(2)
[ 2] Industry Standards
85(1)
[ D] Data Protection
86(1)
[ 1] Overarching Rules
86(1)
[ 2] GDPR
87(3)
[ 3] Accessing Documents from the EU
90(1)
[ 4] EU and Processing of Personal Data
90(1)
[ 5] Cookie Directive
91(1)
[ 6] Cybersecurity Sanctions
92(1)
§4.03 Relevant Institutions, Bodies and Entities
93(9)
[ A] ENISA
93(1)
[ B] CERT-EU
93(2)
[ C] Cyber and the EDA
95(2)
[ D] Europol
97(1)
[ E] CEPOL
98(1)
[ F] European Cybersecurity Research and Competence Centre
99(1)
[ G] Joint EU Diplomatic Response to Malicious Cyberattacks
100(1)
[ H] EU-LISA
101(1)
§4.04 Conclusion
102(1)
Chapter 5 Space (Law) and Cybersecurity
103(26)
§5.01 General Remarks
103(2)
[ A] Growth Tendencies in the Global Space Economy
103(1)
[ B] Interconnectivity in the Space Sector: The Role of Cyberspace in Outer Space
104(1)
§5.02 The Legal Framework Governing Human Activities in Outer Space
105(4)
[ A] Applicability of General International Law and Space Law to Outer Space
106(2)
[ B] Relevant Principles of Space Law
108(1)
§5.03 Challenges for the Cybersecurity of Space Assets
109(7)
[ A] Factual Challenges
109(1)
[ 1] Elements of Satellite Systems as Entry Points for Cyber Intrusions
110(1)
[ 2] Remoteness and Interconnectedness of Space Objects as Weakness Factors for Cybersecurity
111(1)
[ B] Major Types of Security Challenges for Satellite Infrastructure
111(3)
[ C] New Activities in Outer Space
114(1)
[ D] The Role of Cybersecurity for Space Activities
115(1)
§5.04 Legal Challenges at the Intersection Between Outer Space and Cyberspace
116(8)
[ A] Regulatory Issues
117(1)
[ B] Applicability of Space Law to Cyber Activities
118(3)
[ C] Establishing Jurisdiction, Attributability and State Responsibility for Cyber (Space) Activities: A Feasible Endeavour?
121(3)
§5.05 Cybersecurity for Space Assets: International Regulation Efforts
124(2)
§5.06 Conclusion
126(3)
Chapter 6 Critical Infrastructure for Aviation and Space Activities: Satellite Communication and Navigation
129(26)
§6.01 Introduction
129(1)
§6.02 Satellites and Critical Infrastructures
129(9)
[ A] Critical Infrastructures
129(3)
[ B] Space Infrastructure
132(1)
[ C] Satellite Communications
133(2)
[ D] Satellite Navigation
135(2)
[ E] Dual Use of Commercial Satellites
137(1)
§6.03 The Vulnerability of the Space Infrastructure to Electromagnetic Interferences
138(5)
[ A] Modern Threats to Satellites
138(3)
[ B] Jamming
141(1)
[ C] Spoofing
142(1)
§6.04 ITU Legal Framework
143(8)
[ A] ITU and Its Role
143(2)
[ B] Relevant Provisions for Electromagnetic Interferences
145(2)
[ C] Effectiveness of the Provisions
147(4)
§6.05 Electronic Interference Versus Cyberattacks
151(1)
§6.06 Conclusion
152(3)
Chapter 7 Public International Civil Aviation Law
155(36)
§7.01 Convention on International Civil Aviation 1944
155(1)
§7.02 Interpretation: Case Study of Article 3 Bis
156(2)
§7.03 Creation of Complementary Bilateral and Multilateral Treaties: Case Study of Air Service Agreements
158(1)
§7.04 Criminal Air Law
159(4)
[ A] Beijing Convention and Protocol 2010
160(2)
[ B] Interpretation: Case Study of the Hague Convention 1970
162(1)
[ C] Addressing Cybersecurity Through National Law
162(1)
§7.05 Annexes to the Chicago Convention 1944
163(6)
[ A] `Cyber Threats'
165(2)
[ B] Different Types of Interference
167(1)
[ C] Filling the Gaps
168(1)
§7.06 ICAO
169(11)
[ A] Organisational Structure: Safety Versus Security
169(2)
[ B] Panels and Study Groups
171(1)
[ 1] AVSEC Panel
171(1)
[ 2] SSGC
172(1)
[ 3] TFSG
172(1)
[ C] Other Relevant Activities
173(1)
[ 1] General Assembly Resolution
173(1)
[ 2] Dubai Declaration
174(2)
[ 3] Cybersecurity Strategy
176(1)
[ 4] Global Aviation Security Plan
177(1)
[ 5] European Aviation Security Training Institute
178(1)
[ D] IHLG
178(2)
§7.07 Regional Safety and Security Organisations: Case Study of the EU
180(10)
[ A] Bucharest Declaration
181(1)
[ B] Krakow Declaration
182(1)
[ C] Safety
183(4)
[ D] Security
187(3)
§7.08 Conclusion
190(1)
Chapter 8 Aviation Liability in Cases of Cyberattacks
191(22)
§8.01 Liability in the Case of Damage Caused to Air Carrier Passengers
191(11)
[ A] Death or Injury of Passengers Resulting from a Cyberattack
195(3)
[ B] Damage to Passengers Resulting from a Cyberattack Within the EU
198(4)
§8.02 Liability in the Case of Damage to Third Parties
202(4)
§8.03 Other Cases of Liability
206(1)
§8.04 Insurance
207(5)
[ A] Applicable Insurance Law in Aviation
208(1)
[ B] Underwriting Considerations
209(1)
[ C] Insurance Contract
210(2)
§8.05 Conclusion
212(1)
Chapter 9 Lessons Learned
213(22)
§9.01 Introduction
213(1)
§9.02 Increasing Number of Cyberattacks
213(1)
§9.03 General Characteristics of a Cyberattack
214(6)
[ A] Attackers
214(1)
[ 1] White Hat v. Black Hat hackers
214(1)
[ 2] States
215(1)
[ 3] State-Sponsored Entities
215(1)
[ 4] Cyber-Terrorists
215(1)
[ 5] Hacktivists
215(1)
[ 6] Cybercriminals
216(1)
[ 7] Insiders
216(1)
[ B] Attack Methods
216(2)
[ C] Victims
218(1)
[ D] Life Cycle
219(1)
§9.04 Purpose of Cybersecurity Measures
220(1)
§9.05 Control Types
221(1)
§9.06 Measures to Increase Cybersecurity
222(11)
[ A] Law and Regulations
222(2)
[ 1] Canada
224(1)
[ 2] China
224(1)
[ 3] Israel
224(1)
[ 4] Japan
225(1)
[ 5] Russian Federation
225(1)
[ 6] Singapore
225(1)
[ 7] The US
226(1)
[ B] Challenges for National Regulatory Frameworks
226(1)
[ C] Industry Standards
227(1)
[ D] Private Self-Regulation
228(2)
[ E] Information Sharing and Reporting
230(1)
[ F] Risk Assessment
230(1)
[ G] Training
231(1)
[ H] Incident Response
231(1)
[ I] A Focus on Contractual Practice
232(1)
§9.07 Final Conclusions
233(2)
Index 235