Font Size: a A A

Research On The Critical Information Infrastructures Protection

Posted on:2019-06-14Degree:MasterType:Thesis
Country:ChinaCandidate:J M ShaoFull Text:PDF
GTID:2416330590489575Subject:Law
Abstract/Summary:PDF Full Text Request
Since the Cybersecurity Law was promulgated,the definition of the Critical Information Infrastructures(CII)and its scope has sparked heated discussions.Because the conception of the Critical Infrastructures(CI)and CII are so similar that this article must distinguish these two conceptions firstly.Then,bring out the highlights of the conception of CII in ISO/IEC 27032: 2012(Hereinafter referred to as "ISO 27032")to redefine CII.Based on the conception of review,the author analyzed and compared the relationship between CI and CII at home and abroad.Secondly,this article makes a legal analysis of CIIP system.On the one hand,it introduced the CIIP legal system from the perspective of the Cybersecurity Law,including the legal subjects,legal content,and legal objects,to clarify the relationships of multiparty rights and obligations.On the other hand,it also introduced how to link the CIIP system to the hierarchical protection system,ISO 27032,as well as the National Security Law,Conservative State Secrets Law,the Anti-Terrorism Law,the Criminal Law and the Civil Code.Through the above analysis,we can find that China's CIIP system still has many problems,for example,the scope of the definition of CII is not clear enough,the convergence of other legal documents is not clear,the content is not comprehensive,and even in practice there are also misunderstandings.Based on the discovery of problems,this paper draws on the advanced experience of various countries from three levels,including national security,law enforcement,and technical support.Then absorbs a new perspective of ISO 27032 to specifies detailed measures for each level as reasonable suggestions to improving China's CIIP legal system.
Keywords/Search Tags:CII, CI, Cybersecurity Law, ISO/IEC 27032: 2012, CIIP legal system
PDF Full Text Request
Related items