SlideShare a Scribd company logo
1 of 6
“International law on cyber security in the age of
Digital Sovereignty”
Organized by International forum of Lawyers and
Economics
Prabhpreet Singh
Assistant Professor, SoL, Manipal University Jaipur
Contentious
academic
debates
Cyberspace
should
remain free
Cyberspace
Should be
regulated
Three
dominant
ideas on how
cyberspace
should be
regulated by
International
law
Liberal Institutionalists: liberal institutionalists
like wu (1997) call for the importance of the
international institution and rule-based
multilateralism in managing cyberspace.
Cyberlibertarians: like John Barlow (1996) are
proponents of the idea that cyberspace should
remain free from tyranny and any oppressive rule
that might hinder the internet liberty.
Statists, like James Lewis (2010), believe that it is
states’ responsibility to formulate national and
international law to govern cyberspace.
International Law on Cyber Space
and Digital
Digital sovereignty is the idea to control and govern access, information,
communication, network, and infrastructure in digital realm by international actors.
The idea of digital sovereignty would disconnect global internet as it is now. As a
result, it hardens the possibility of international actors to come into agreement to
formulate effective and binding international law on cyber space.
It also hardens the possibility to adjudicate cases of cyber violations to state actors
since digital sovereignty is engrained with non-interference principles–it is difficult to
punish and blame state actors for their conduct in arbitration as we have seen in
International Criminal Court.
Regulating cyberspace by arbitration, Permanent Court of Arbitration
Cyber Attacks & Budapest
Convention
Recent occurrences of cyber attack
Channel Nine- It is an Australian broadcaster and was hit by cyber attack on March 28, 2021. Due to this attack channel was
unable to render the news bulletin on Sunday and several other shows were also affected. The headquarters, at Sydney was
unable to access to access internet and hence business and publishing tools were also down. Initially, the channel claimed that it
was due to technical difficulties but was later confirmed as cyber attack.
Harris Federation- It is Landon based federation and was hit by ransomware attack in March, 2021. Due to this, the federation
was forced to disable devices and email along with 50 secondary and primary academics managed by it. It was reported that
37,000 students were affected.
CNA Financial- It is one of the biggest cyber insurance firms at USA and suffered attack on March 21, 2021. The firm was forced
to shut down for three days to prevent any further compromise. The customers and employees were primary victim. A new
version of the Phoenix Crypto Locker was utilized and it is a form of ransomware.
Florida Water System- The cyber attackers made an attempt to poison the water supply at Florida. A bit of the plan was
managed by increasing the amount of sodium hydroxide. The criminals breached Oldsmar’s computer system and the amount
of sodium hydroxide increased from 100 parts per million to 11,100 parts per million.
THANK YOU
WHOLEHEARTEDLY
FOR HAVING ME!!!

More Related Content

Similar to Digital soverginity and cyberspace.pptx

A week is a long time in computer ethics
A week is a long time in computer ethicsA week is a long time in computer ethics
A week is a long time in computer ethicsUltraUploader
 
Ransomware (1).pdf
Ransomware (1).pdfRansomware (1).pdf
Ransomware (1).pdfHiYeti1
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber lawsDr. Prashant Vats
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimesrinushalu
 
Chapter-2.docx
Chapter-2.docxChapter-2.docx
Chapter-2.docxAmir Khan
 
THE PROFESSIONALIZATION OF THE HACKER INDUSTRY
THE PROFESSIONALIZATION OF THE HACKER INDUSTRYTHE PROFESSIONALIZATION OF THE HACKER INDUSTRY
THE PROFESSIONALIZATION OF THE HACKER INDUSTRYijcsit
 
Online security – an assessment of the new
Online security – an assessment of the newOnline security – an assessment of the new
Online security – an assessment of the newsunnyjoshi88
 
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIAHISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIAIRJET Journal
 
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in IndonesiaViolations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in IndonesiaUniversitas Pembangunan Panca Budi
 
Keep in touch for cyber peace_20150212
Keep in touch for cyber peace_20150212Keep in touch for cyber peace_20150212
Keep in touch for cyber peace_20150212Kunihiro Maeda
 
A Study on the Cyber-Crime and Cyber Criminals: A Global Problem
A Study on the Cyber-Crime and Cyber Criminals: A Global ProblemA Study on the Cyber-Crime and Cyber Criminals: A Global Problem
A Study on the Cyber-Crime and Cyber Criminals: A Global Problemijbuiiir1
 
GEL 221 - Group 1 PPT (Cyber Libel & Security).pptx
GEL 221 - Group 1 PPT (Cyber Libel & Security).pptxGEL 221 - Group 1 PPT (Cyber Libel & Security).pptx
GEL 221 - Group 1 PPT (Cyber Libel & Security).pptxzyleflorence
 
PROTECTING THE NATION’S CYBER SYSTEMS 9WHAT ARE THE .docx
PROTECTING THE NATION’S CYBER SYSTEMS    9WHAT ARE THE .docxPROTECTING THE NATION’S CYBER SYSTEMS    9WHAT ARE THE .docx
PROTECTING THE NATION’S CYBER SYSTEMS 9WHAT ARE THE .docxbriancrawford30935
 
Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02Gol D Roger
 

Similar to Digital soverginity and cyberspace.pptx (20)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
A week is a long time in computer ethics
A week is a long time in computer ethicsA week is a long time in computer ethics
A week is a long time in computer ethics
 
Ransomware (1).pdf
Ransomware (1).pdfRansomware (1).pdf
Ransomware (1).pdf
 
Cybercrime: An Analysis from Positive Law Perspective
Cybercrime: An Analysis from Positive Law PerspectiveCybercrime: An Analysis from Positive Law Perspective
Cybercrime: An Analysis from Positive Law Perspective
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber laws
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
 
Chapter-2.docx
Chapter-2.docxChapter-2.docx
Chapter-2.docx
 
THE PROFESSIONALIZATION OF THE HACKER INDUSTRY
THE PROFESSIONALIZATION OF THE HACKER INDUSTRYTHE PROFESSIONALIZATION OF THE HACKER INDUSTRY
THE PROFESSIONALIZATION OF THE HACKER INDUSTRY
 
The Professionalization of the Hacker Industry
The Professionalization of the Hacker IndustryThe Professionalization of the Hacker Industry
The Professionalization of the Hacker Industry
 
Online security – an assessment of the new
Online security – an assessment of the newOnline security – an assessment of the new
Online security – an assessment of the new
 
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIAHISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
 
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in IndonesiaViolations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
 
Keep in touch for cyber peace_20150212
Keep in touch for cyber peace_20150212Keep in touch for cyber peace_20150212
Keep in touch for cyber peace_20150212
 
A Study on the Cyber-Crime and Cyber Criminals: A Global Problem
A Study on the Cyber-Crime and Cyber Criminals: A Global ProblemA Study on the Cyber-Crime and Cyber Criminals: A Global Problem
A Study on the Cyber-Crime and Cyber Criminals: A Global Problem
 
GEL 221 - Group 1 PPT (Cyber Libel & Security).pptx
GEL 221 - Group 1 PPT (Cyber Libel & Security).pptxGEL 221 - Group 1 PPT (Cyber Libel & Security).pptx
GEL 221 - Group 1 PPT (Cyber Libel & Security).pptx
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 
Cyber Crime Essay
Cyber Crime EssayCyber Crime Essay
Cyber Crime Essay
 
PROTECTING THE NATION’S CYBER SYSTEMS 9WHAT ARE THE .docx
PROTECTING THE NATION’S CYBER SYSTEMS    9WHAT ARE THE .docxPROTECTING THE NATION’S CYBER SYSTEMS    9WHAT ARE THE .docx
PROTECTING THE NATION’S CYBER SYSTEMS 9WHAT ARE THE .docx
 
2013 01-14
2013 01-142013 01-14
2013 01-14
 
Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02
 

Recently uploaded

CASE STYDY Lalman Shukla v Gauri Dutt BY MUKUL TYAGI.pptx
CASE STYDY Lalman Shukla v Gauri Dutt BY MUKUL TYAGI.pptxCASE STYDY Lalman Shukla v Gauri Dutt BY MUKUL TYAGI.pptx
CASE STYDY Lalman Shukla v Gauri Dutt BY MUKUL TYAGI.pptxMUKUL TYAGI
 
Embed-1-1.pdfohediooieoiehohoiefoloeohefoi
Embed-1-1.pdfohediooieoiehohoiefoloeohefoiEmbed-1-1.pdfohediooieoiehohoiefoloeohefoi
Embed-1-1.pdfohediooieoiehohoiefoloeohefoibhavenpr
 
Petitioner Moot Memorial including Charges and Argument Advanced.docx
Petitioner Moot Memorial including Charges and Argument Advanced.docxPetitioner Moot Memorial including Charges and Argument Advanced.docx
Petitioner Moot Memorial including Charges and Argument Advanced.docxRumantSharma
 
Streamline Legal Operations: A Guide to Paralegal Services
Streamline Legal Operations: A Guide to Paralegal ServicesStreamline Legal Operations: A Guide to Paralegal Services
Streamline Legal Operations: A Guide to Paralegal ServicesEternity Paralegal Services
 
Law of succession-Notes for students studying law
Law of succession-Notes for students studying lawLaw of succession-Notes for students studying law
Law of succession-Notes for students studying lawMANGAUNGUSDGQUARTERL
 
Embed-6 (1).pdfc p;p;kdk[odk[drskpokpopo
Embed-6 (1).pdfc p;p;kdk[odk[drskpokpopoEmbed-6 (1).pdfc p;p;kdk[odk[drskpokpopo
Embed-6 (1).pdfc p;p;kdk[odk[drskpokpopobhavenpr
 
Comprehensive Guide on Drafting Directors' Report and its ROC Compliances und...
Comprehensive Guide on Drafting Directors' Report and its ROC Compliances und...Comprehensive Guide on Drafting Directors' Report and its ROC Compliances und...
Comprehensive Guide on Drafting Directors' Report and its ROC Compliances und...neha695897
 
Essential Components of an Effective HIPAA Safeguard Program
Essential Components of an Effective HIPAA Safeguard ProgramEssential Components of an Effective HIPAA Safeguard Program
Essential Components of an Effective HIPAA Safeguard ProgramColington Consulting
 
Termination of Employees under the Labor Code.pptx
Termination of Employees under the Labor Code.pptxTermination of Employees under the Labor Code.pptx
Termination of Employees under the Labor Code.pptxBrV
 
Embed-2-2.pdf[[app[r[prf[-rk;lme;[ed[prp[
Embed-2-2.pdf[[app[r[prf[-rk;lme;[ed[prp[Embed-2-2.pdf[[app[r[prf[-rk;lme;[ed[prp[
Embed-2-2.pdf[[app[r[prf[-rk;lme;[ed[prp[bhavenpr
 
2024 Managing Labor + Employee Relations Seminar
2024 Managing Labor + Employee Relations Seminar2024 Managing Labor + Employee Relations Seminar
2024 Managing Labor + Employee Relations SeminarKegler Brown Hill + Ritter
 
TTD - PPT on social stock exchange.pptx Presentation
TTD - PPT on social stock exchange.pptx PresentationTTD - PPT on social stock exchange.pptx Presentation
TTD - PPT on social stock exchange.pptx PresentationRRR Chambers
 
Embed-4-2.pdf vk[di-[sd[0edKP[p-[kedkpodekp
Embed-4-2.pdf vk[di-[sd[0edKP[p-[kedkpodekpEmbed-4-2.pdf vk[di-[sd[0edKP[p-[kedkpodekp
Embed-4-2.pdf vk[di-[sd[0edKP[p-[kedkpodekpbhavenpr
 
Does Apple Neurotechnology Patents Go To Far?
Does Apple  Neurotechnology Patents Go To Far?Does Apple  Neurotechnology Patents Go To Far?
Does Apple Neurotechnology Patents Go To Far?Graham Ware
 
Skill Development in Law, Para Legal & other Fields and Export of Trained Man...
Skill Development in Law, Para Legal & other Fields and Export of Trained Man...Skill Development in Law, Para Legal & other Fields and Export of Trained Man...
Skill Development in Law, Para Legal & other Fields and Export of Trained Man...Nilendra Kumar
 
一比一原版(ASU毕业证书)亚利桑那州立大学毕业证成绩单原件一模一样
一比一原版(ASU毕业证书)亚利桑那州立大学毕业证成绩单原件一模一样一比一原版(ASU毕业证书)亚利桑那州立大学毕业证成绩单原件一模一样
一比一原版(ASU毕业证书)亚利桑那州立大学毕业证成绩单原件一模一样mefyqyn
 
Respondent Moot Memorial including Charges and Argument Advanced.docx
Respondent Moot Memorial including Charges and Argument Advanced.docxRespondent Moot Memorial including Charges and Argument Advanced.docx
Respondent Moot Memorial including Charges and Argument Advanced.docxRumantSharma
 
posts-harmful-to-secular-structure-of-the-country-539103-1.pdf
posts-harmful-to-secular-structure-of-the-country-539103-1.pdfposts-harmful-to-secular-structure-of-the-country-539103-1.pdf
posts-harmful-to-secular-structure-of-the-country-539103-1.pdfbhavenpr
 
IRDA role in Insurance sector in India .pptx
IRDA role in Insurance sector in India .pptxIRDA role in Insurance sector in India .pptx
IRDA role in Insurance sector in India .pptxShreyasVyas9
 

Recently uploaded (20)

CASE STYDY Lalman Shukla v Gauri Dutt BY MUKUL TYAGI.pptx
CASE STYDY Lalman Shukla v Gauri Dutt BY MUKUL TYAGI.pptxCASE STYDY Lalman Shukla v Gauri Dutt BY MUKUL TYAGI.pptx
CASE STYDY Lalman Shukla v Gauri Dutt BY MUKUL TYAGI.pptx
 
Embed-1-1.pdfohediooieoiehohoiefoloeohefoi
Embed-1-1.pdfohediooieoiehohoiefoloeohefoiEmbed-1-1.pdfohediooieoiehohoiefoloeohefoi
Embed-1-1.pdfohediooieoiehohoiefoloeohefoi
 
Petitioner Moot Memorial including Charges and Argument Advanced.docx
Petitioner Moot Memorial including Charges and Argument Advanced.docxPetitioner Moot Memorial including Charges and Argument Advanced.docx
Petitioner Moot Memorial including Charges and Argument Advanced.docx
 
Streamline Legal Operations: A Guide to Paralegal Services
Streamline Legal Operations: A Guide to Paralegal ServicesStreamline Legal Operations: A Guide to Paralegal Services
Streamline Legal Operations: A Guide to Paralegal Services
 
Trending Topics in ITC Litigation with Knobbe Martens
Trending Topics in ITC Litigation with Knobbe MartensTrending Topics in ITC Litigation with Knobbe Martens
Trending Topics in ITC Litigation with Knobbe Martens
 
Law of succession-Notes for students studying law
Law of succession-Notes for students studying lawLaw of succession-Notes for students studying law
Law of succession-Notes for students studying law
 
Embed-6 (1).pdfc p;p;kdk[odk[drskpokpopo
Embed-6 (1).pdfc p;p;kdk[odk[drskpokpopoEmbed-6 (1).pdfc p;p;kdk[odk[drskpokpopo
Embed-6 (1).pdfc p;p;kdk[odk[drskpokpopo
 
Comprehensive Guide on Drafting Directors' Report and its ROC Compliances und...
Comprehensive Guide on Drafting Directors' Report and its ROC Compliances und...Comprehensive Guide on Drafting Directors' Report and its ROC Compliances und...
Comprehensive Guide on Drafting Directors' Report and its ROC Compliances und...
 
Essential Components of an Effective HIPAA Safeguard Program
Essential Components of an Effective HIPAA Safeguard ProgramEssential Components of an Effective HIPAA Safeguard Program
Essential Components of an Effective HIPAA Safeguard Program
 
Termination of Employees under the Labor Code.pptx
Termination of Employees under the Labor Code.pptxTermination of Employees under the Labor Code.pptx
Termination of Employees under the Labor Code.pptx
 
Embed-2-2.pdf[[app[r[prf[-rk;lme;[ed[prp[
Embed-2-2.pdf[[app[r[prf[-rk;lme;[ed[prp[Embed-2-2.pdf[[app[r[prf[-rk;lme;[ed[prp[
Embed-2-2.pdf[[app[r[prf[-rk;lme;[ed[prp[
 
2024 Managing Labor + Employee Relations Seminar
2024 Managing Labor + Employee Relations Seminar2024 Managing Labor + Employee Relations Seminar
2024 Managing Labor + Employee Relations Seminar
 
TTD - PPT on social stock exchange.pptx Presentation
TTD - PPT on social stock exchange.pptx PresentationTTD - PPT on social stock exchange.pptx Presentation
TTD - PPT on social stock exchange.pptx Presentation
 
Embed-4-2.pdf vk[di-[sd[0edKP[p-[kedkpodekp
Embed-4-2.pdf vk[di-[sd[0edKP[p-[kedkpodekpEmbed-4-2.pdf vk[di-[sd[0edKP[p-[kedkpodekp
Embed-4-2.pdf vk[di-[sd[0edKP[p-[kedkpodekp
 
Does Apple Neurotechnology Patents Go To Far?
Does Apple  Neurotechnology Patents Go To Far?Does Apple  Neurotechnology Patents Go To Far?
Does Apple Neurotechnology Patents Go To Far?
 
Skill Development in Law, Para Legal & other Fields and Export of Trained Man...
Skill Development in Law, Para Legal & other Fields and Export of Trained Man...Skill Development in Law, Para Legal & other Fields and Export of Trained Man...
Skill Development in Law, Para Legal & other Fields and Export of Trained Man...
 
一比一原版(ASU毕业证书)亚利桑那州立大学毕业证成绩单原件一模一样
一比一原版(ASU毕业证书)亚利桑那州立大学毕业证成绩单原件一模一样一比一原版(ASU毕业证书)亚利桑那州立大学毕业证成绩单原件一模一样
一比一原版(ASU毕业证书)亚利桑那州立大学毕业证成绩单原件一模一样
 
Respondent Moot Memorial including Charges and Argument Advanced.docx
Respondent Moot Memorial including Charges and Argument Advanced.docxRespondent Moot Memorial including Charges and Argument Advanced.docx
Respondent Moot Memorial including Charges and Argument Advanced.docx
 
posts-harmful-to-secular-structure-of-the-country-539103-1.pdf
posts-harmful-to-secular-structure-of-the-country-539103-1.pdfposts-harmful-to-secular-structure-of-the-country-539103-1.pdf
posts-harmful-to-secular-structure-of-the-country-539103-1.pdf
 
IRDA role in Insurance sector in India .pptx
IRDA role in Insurance sector in India .pptxIRDA role in Insurance sector in India .pptx
IRDA role in Insurance sector in India .pptx
 

Digital soverginity and cyberspace.pptx

  • 1. “International law on cyber security in the age of Digital Sovereignty” Organized by International forum of Lawyers and Economics Prabhpreet Singh Assistant Professor, SoL, Manipal University Jaipur
  • 3. Three dominant ideas on how cyberspace should be regulated by International law Liberal Institutionalists: liberal institutionalists like wu (1997) call for the importance of the international institution and rule-based multilateralism in managing cyberspace. Cyberlibertarians: like John Barlow (1996) are proponents of the idea that cyberspace should remain free from tyranny and any oppressive rule that might hinder the internet liberty. Statists, like James Lewis (2010), believe that it is states’ responsibility to formulate national and international law to govern cyberspace.
  • 4. International Law on Cyber Space and Digital Digital sovereignty is the idea to control and govern access, information, communication, network, and infrastructure in digital realm by international actors. The idea of digital sovereignty would disconnect global internet as it is now. As a result, it hardens the possibility of international actors to come into agreement to formulate effective and binding international law on cyber space. It also hardens the possibility to adjudicate cases of cyber violations to state actors since digital sovereignty is engrained with non-interference principles–it is difficult to punish and blame state actors for their conduct in arbitration as we have seen in International Criminal Court. Regulating cyberspace by arbitration, Permanent Court of Arbitration
  • 5. Cyber Attacks & Budapest Convention Recent occurrences of cyber attack Channel Nine- It is an Australian broadcaster and was hit by cyber attack on March 28, 2021. Due to this attack channel was unable to render the news bulletin on Sunday and several other shows were also affected. The headquarters, at Sydney was unable to access to access internet and hence business and publishing tools were also down. Initially, the channel claimed that it was due to technical difficulties but was later confirmed as cyber attack. Harris Federation- It is Landon based federation and was hit by ransomware attack in March, 2021. Due to this, the federation was forced to disable devices and email along with 50 secondary and primary academics managed by it. It was reported that 37,000 students were affected. CNA Financial- It is one of the biggest cyber insurance firms at USA and suffered attack on March 21, 2021. The firm was forced to shut down for three days to prevent any further compromise. The customers and employees were primary victim. A new version of the Phoenix Crypto Locker was utilized and it is a form of ransomware. Florida Water System- The cyber attackers made an attempt to poison the water supply at Florida. A bit of the plan was managed by increasing the amount of sodium hydroxide. The criminals breached Oldsmar’s computer system and the amount of sodium hydroxide increased from 100 parts per million to 11,100 parts per million.