Font Size: a A A

Legal Thinking On Network Attack Of Network

Posted on:2016-12-29Degree:MasterType:Thesis
Country:ChinaCandidate:X H LiuFull Text:PDF
GTID:2206330461987158Subject:Law
Abstract/Summary:PDF Full Text Request
Network attacks, this sounds like the movies in recent years has entered the vocabulary of the horizon. Unlike previous conventional attack, it is often used secret and swift manner. Many attacks possible media coverage had a chance, it has completed its mission and "mission accomplished." Its fast attack is different from its consequences. A cyber attack would not only affect the order of the virtual world, but also extends to the real world, that is, through the Internet to attack industrial control systems. In recent years, specifically for the country’s cyber attacks are not uncommon, "Stuxnet"(the English name for Stuxnet) special virus Siemens SIMATIC WinCC industrial control software attack is a typical representative of modern cyber attacks. The rapid development of the Internet world, indeed, the relevant provisions of international law has been insufficient to regulate a wide range of network behavior. In this regard, the active exchange between the countries had to fight for the early establishment of an international law applicable to the Internet. In addition, to achieve national cyberspace security efforts outside the law is also essential, including: the development of national policies, and actively to achieve international cooperation tectonics network defense project. Although some scholars believe that cyber war in the near future will be a new war situation, the network technology is also used as a weapon, but the face of the current national network problems are basically a win-win choice. Although the rapid development of the network compared to the legal aspects of cyber warfare research is still very limited in a number of important issues are the lack of consensus of all countries, but I believe that with sound legal reform, an increase in the practice and technology, cyberspace will become more orderly.
Keywords/Search Tags:Network attacks, Application of law, International cooperation, Technical exchang
PDF Full Text Request
Related items