Font Size: a A A

Research On Information Sharing Mechanism Of Critical Information Infrastructure

Posted on:2020-04-27Degree:MasterType:Thesis
Country:ChinaCandidate:J FuFull Text:PDF
GTID:2416330575456660Subject:Science of Law
Abstract/Summary:PDF Full Text Request
Critical information infrastructure(CII)security assurance i s the national key project,and its operation safety has risen to the national security level,but it is still not mature in terms of experie nce and mechanism construction.Compared with the hierarchical pr otection mechanism,the risk early warning mechanism,the emergen cy response mechanism,the after-the-fact recovery and the disciplin ary mechanism,there are still many gaps in the micro-detail system design at the information sharing mechanism construction level.This article starts with the concept of CII and information sharing mechanism,and leads readers to understand the research o bjective.Under the framework of the mechanism,CII operators,re gulatory departments(governments)and executive departments(law enforcement agencies)act as three-dimensional main entities for info rmation sharing,strictly following the information classification syst em and information inspection system,and making Technologically i nnovative and Element-evaluation identification for the four types of information:"threat information","risk information","intelligence i nformation"and "vulnerability information "to ensure the quality an d timeliness of the sharing information.In addition,the essence of shared information is to ensure the safe and effective operation of CII.Therefore,Specific types,strict hierarchies,multiple ways and t he timely sharing are required,which also determines that the share d information of this study is not“general information".While the i nformation cardinality is too large,the privacy protection system an d the liability exemption system are constructed to encourage all en tities to participate actively.It is hoped that through the balance of rights and obligations,the rights holders' information can be guara nteed to the greatest extent in the process of being shared.It is als o hoped that each party can strictly fulfill its obligations,and ensur e that the information that it shares and gets is in legally ordered e nvironment,highly protective technical environment and clean and t ransparent cultural environment.
Keywords/Search Tags:critical information infrastructure, information sharing, privacy, liability exemption
PDF Full Text Request
Related items