Font Size: a A A

Research On Network International Regulation System From The Perspective Of National Security

Posted on:2020-07-28Degree:MasterType:Thesis
Country:ChinaCandidate:J N LiFull Text:PDF
GTID:2416330572978268Subject:International Law
Abstract/Summary:PDF Full Text Request
The development and popularization of the network has extended its reach to all aspects of the country and society.Due to its openness and global characteristics,it is difficult to achieve network security control by domestic law alone.Therefore,regulating the network through international law is an international hotspot in recent years.At this stage,international treaties on cybersecurity are scarce.Especially on the issue of cyber attacks,there is no specific international law document.It can only be applied to the context of cyber attacks by interpreting the provisions of traditional international law.This is also why I believe it is necessary to write an analysis of this issue.This paper first introduces the concept of network security,the characteristics of cyberspace and the behaviors that affect network security,and explains why cyber attacks are chosen as the analysis object.Then introduce the status quo of international regulations on cyber attacks.The following trunk part divides the process of regulating cyberattack behavior into four steps and promotes it at different levels,including firstly demonstrating that cyber attacks constitute a violation of national sovereignty,and then characterization of cyberattacks,and then how to prove attribution to the state,finally,the right to self-defense and the laws of war are used as a way to deal with cyber attacks.At the end,we conceive how our country promotes the emergence of new conventions based on existing international law.The innovation of this paper is to analyze the network security problem from the perspective of cyber attack behavior,and divide the regulation process of cyber attack behavior into four stages.Each stage lists the existing international law and applies it to the analysis and points out the shortcomings.
Keywords/Search Tags:cybersecurity, cyberattack, cyber sovereignty, UN Charter, force behavior, soft law
PDF Full Text Request
Related items