Font Size: a A A

Research On Legal Problems In The Exploitation Of White Hat To Security Vulnerabilities

Posted on:2019-03-10Degree:MasterType:Thesis
Country:ChinaCandidate:S L XuFull Text:PDF
GTID:2346330545458491Subject:Science of Law
Abstract/Summary:PDF Full Text Request
The network has integrated into people's lives and brought great convenience to people's lives.But at the same time,the world is also facing a huge threat to cybersecurity.Uninterrupted network attacks,frequent data breaches have brought tremendous losses to the country and society.The fight against cyber-attacks and the maintenance of cyber security require the concerted efforts of all parties."White hat" is one of the most important private forces that play an important role in addressing the inappropriate exploit of bad hackers.However,there is still a lack of understanding of"white hat" in our country at present,and the lack of definition of its legal status and social acceptance.There are many problems in legislation and practice.In terms of legislation,there are still no relevant provisions on the detection of loopholes in our law.What is more,there is a lack of pertinent provisions on the "white hat",thus leaving a series of legal gaps and urgent solutions to the law.In practice,the detection system of the security vulnerabilities formed around "white hat" in our country is not yet perfect,and the relevant links need to be perfected.Based on the analysis of "White Hat" and its related concepts,this article summarizes the problems in the law and practice faced by "White Hat" in our country's security vulnerability mining and attempts to answer them.In the end,it puts forward some suggestions on the issues involved in the security breach of "white hat" and discusses how to build a security system to detect loopholes in the country with "white hat" as the core.This article is divided into four chapters in addition to the introduction and conclusion:the first chapter of the dissertation analyzes "white hat"and its related concepts,and clarifies the object for the following discussion;the second chapter summarizes the domestic laws and regulations involved in the mining of "white hat" and presents the current legal situation,this part also puts forward several references to foreign legal regulations;the third chapter analyzes the current legal problems faced by "white hat" in the detection of security breach;the fourth chapter discusses how to improve the "white hat" as the core of security vulnerability detection system,and for the problems raised in the previous chapter gives a sound proposal;the conclusion part summarizes the full text and summarizes the main points of each part of the article.
Keywords/Search Tags:white hat, vulnerability, public test platform, hacker, vulnerability exploit
PDF Full Text Request
Related items