Cybersecurity, Critical Infrastructure Protection & Cyber Warfare

  • Soumya Ranjan Muduli
  • Show Author Details
  • Soumya Ranjan Muduli

    Student at KIIT School of Law, Bhubaneswar, Odisha, India

  • img Download Full Paper

Abstract

This paper studies how increasingly complex cyber threats are being directed at our nation's critical infrastructure along with the changing military and legal doctrine that results. One aspect of this study focuses on the move away from "information-enabled warfare" and towards "strategic cyber warfare," where disrupting the operations of systemic functions will be a primary way to achieve grand strategic objectives. Using peer-reviewed literature as well as recent technical advisories the study finds a 40% increase in Internet-exposed devices with Industrial Control Systems (ICS) between 2024 and 2025 indicating a major change in how adversaries will target these systems; therefore, this paper also examines the meaning behind the principles of cyber deterrence, the implementation of the Tallinn Manual 2.0 in international law and national strategies of emerging digital powers such as India. The findings of this analysis point out that AI threat detection and zero trust architecture will be particularly effective in helping to mitigate risk. However, the encroachment of quantum computing leads to a pending crisis of cryptographic obsolescence. In the end, this paper concludes that despite improved defensive capabilities provided by technological advancements, the continued existence of the "attribution dilemma" and "offensive agenda" of cyberspace demonstrates an absolute need for an integrated approach involving technical hardening, international legal cooperation and meaningful public-private partnerships.

Keywords

  • Critical Infrastructure
  • Strategic Cyber Warfare
  • Industrial Control Systems (ICS)
  • Cyber Deterrence
  • Tallinn Manual 2.0

Type

Research Paper

Information

International Journal of Law Management and Humanities, Volume 9, Issue 2, Page 1161 - 1173

DOI: https://doij.org/10.10000/IJLMH.1111613

Creative Commons

This is an Open Access article, distributed under the terms of the Creative Commons Attribution -NonCommercial 4.0 International (CC BY-NC 4.0) (https://creativecommons.org/licenses/by-nc/4.0/), which permits remixing, adapting, and building upon the work for non-commercial use, provided the original work is properly cited.

Copyright

Copyright © IJLMH 2021