Font Size: a A A

Research On Cybersecurity Information Sharing System Of Critical Information Infrastructure

Posted on:2019-01-25Degree:MasterType:Thesis
Country:ChinaCandidate:R J ZhouFull Text:PDF
GTID:2346330545958437Subject:Science of Law
Abstract/Summary:PDF Full Text Request
Cybersecurity information sharing mechanism,one of the protection systems of the critical information infrastructure operation security is based on the clear cybersecurity information concept and diverse subjects sturcture for its specific framework.In this context,cybersecurity information is characterized by industry expertise,content coherence and timeliness instead of the view that all information related to cybersecurity should be included in the scope of sharing.The cybersecurity information that we called should have access to the damage results of CII "critical function".It is necessary that setting specific information category standards based on industry characteristics,which could reflect the details the cybersecurity status and the main cybersecurity threat of CII.At the same time,the content of the cybersecurity information should be compatible with the information protection ability of the main share subjects.We can limit the flow of different types of cybersecurity information within a specific range and ensuring the rational utilization of the cybersecurity information.The United States and Japan make direct provisions on the content and types of cybersecurity information,and these provisions affect the construction of sharing modes.Since the sharing of information has infringed upon the rights and interests of individuals,the two countries have adopted the principle of voluntariness principle as the system basis with setting up the system of sharing incentives and responsibility exemption.They hope a deeper linkage response mechanism.China can make general provisions on the basic concepts of safety information and set the mechanism of entry and exit of participating entities so as to plan different types of information sharing paths.
Keywords/Search Tags:critical information infrastructure, cybersecurity information, sharing subject
PDF Full Text Request
Related items