Article Preview
TopLiterature Review
Cyberspace is a pervasive network that connects every field of contemporary culture. Cyberattacks have become prevalent. Securing cyberspace is, therefore, a major concern of governments around the world. Researchers have been developing standards and innovative methods to strengthen cybersecurity policy, enhancing the security of critical infrastructures and implementing national defensive countermeasures (Vaseashta et al., 2014). Effective frameworks are required to facilitate the use of data analytics to anticipate attacks, identify optimal countermeasures to respond to attacks, and optimize the allocation of resources after an attack (Shahin et al., 2020).
Cyberattacks are classified based on a range of actions. Some attacks involve data and information theft. Others shut down entire systems. Attacks may be motivated by political unrest or social or economic problems. Cyberattacks can even involve espionage that promotes political and financial agendas (Karlidag & Bulut, 2020).
Many authors have identified cyberterrorism and cyberattacks as armed attacks that pose a threat to international security. These authors have attempted to understand the applicability of the rules and provisions of the UN charter to cyberattacks, as well as how these attacks violate domestic and international law. They suggest appropriate responses that countries can use to reduce or eliminate the risks associated with cyberterrorism and cyberattacks. One important strategy is to finalize a multilateral treaty to maintain international peace and security by preventing the use of cyberattacks and removing loopholes that can be exploited by terrorists (Mahnoor & Noor, 2022).