首页> 外文会议>International Conference on Cyber Security, Cyber Warfare and Digital Forensic >Data breach on the critical information infrastructures: Lessons from the Wikileaks
【24h】

Data breach on the critical information infrastructures: Lessons from the Wikileaks

机译:数据违反关键信息基础设施:维基解密的课程

获取原文

摘要

The recent massive critical data leaks by Wikileaks suggest how fragile national security is from the perspective of information system and network sustainability. This incident raises some causes of concern. Firstly, critical infrastructure such as military and diplomatic systems is not spared from security breach. Secondly, such leak causes far-reaching damage to public interests, national security and economic sustainability. And thirdly, both technology and law seem incapable of dealing with such situation. Malaysia is not spared from the risk of information security attacks. Its ten critical sectors as identified in its National Cyber Security Policy (NCSP) -national defence and security; banking and finance; information and communications; energy, transport and water; government, emergency and medical services; as well as food and agriculture-can at any time fall victim to security breaches and data leaks if efforts to protect their system are flawed. The objective this paper is to outline the problems and challenges from the points of legal framework that Malaysia should anticipate and address in maintaining and sustaining its national CII. The paper first look at the problem of data breaches in the world and examine how as the technology becomes more superior, the cyber-world becomes more vulnerable to data breaches. Tied to that is the notion of critical information infrastructure (CIIs). As more and more of these CIIs are connected and dependent on connectivity, the normal incidence of data breach can be a potential of human loss and catastrophe. The paper next look at the concept of critical information security in Malaysia and examine the seriousness of data breaches in Malaysia. The paper seeks to explore legal options that Malaysia can adopt in preparing itself to more data breaches onslaught. It is the basic contention of the paper that the traditional legal framework should be reformed in line with the advances of the information and communications - echnologies.
机译:Wikileaks最近的大规模关键数据泄漏表明,国家安全性来自信息系统和网络可持续性的角度。这一事件提出了一些关注的原因。首先,军事和外交系统等关键基础设施不是从安全违规行动中留下的。其次,这种泄漏导致对公共利益,国家安全和经济可持续性的深远损害。第三,技术和法律似乎无法处理这种情况。马来西亚并非避免了信息安全攻击的风险。其国家网络安全政策(NCSP) - 辩护和安全所确定的十个关键部门;银行和金融;信息和通信;能量,运输和水;政府,紧急和医疗服务;除了粮食和农业 - 在任何时候都会在任何时候都在担任安全漏洞和数据泄漏的情况下,如果保护其系统有缺陷。本文的目标是概述马来西亚应预测和满足维持和维持其国家CII的法律框架问题和挑战。本文首先查看了世界上数据违规问题的问题,并研究了如何将技术变得更加优越,网络世界变得更容易受到数据漏洞的影响。绑定到这是关键信息基础设施(CIIS)的概念。随着这些CII的越来越多的连接和依赖于连接,数据泄露的正常发病率可能是人类丢失和灾难的潜力。本文下一步了解马来西亚关键信息安全的概念,并在马来西亚审查数据违规的严重性。本文寻求探索马来西亚可以采用的法律选择,以便为更多的数据违反冲击。本文的基本争论应根据信息和通信 - Echnologies的进步,符合传统法律框架的基本争论。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号