首页> 外文期刊>Computing reviews >Law, policy and technology: cyberterrorism, information warfare and Internet immobilization
【24h】

Law, policy and technology: cyberterrorism, information warfare and Internet immobilization

机译:法律,政策和技术:网络恐怖主义,信息战和互联网固定化

获取原文
获取原文并翻译 | 示例
           

摘要

It is not a surprise that the "softer" issues around Internet-based cyber-crime, cyber-terrorism, and information warfare are both unclear and constantly evolving. This edited volume, with 13 contributors including two editors who authored over half of the papers, claims to provide the perspective of practitioners. Despite "technology" appearing in the title, there is no significant treatment of technical issues or research. Throughout the volume, the underlying assumption is that attackers can exploit vulnerabilities while preserving their own anonymity. As a consequence, the volume disregards smart processes that can exploit fragmented information about attackers, leading to legal pursuit or counterattacks, not to mention penetration of attackers' resources. Almost no statistics are included on cyber-crime, terrorist incidents, or categorized cyber-attacks.
机译:基于Internet的网络犯罪,网络恐怖主义和信息战的“软性”问题既不清楚又在不断发展,这不足为奇。这本编辑的书共有13位撰稿人,其中包括两名编辑,他们撰写了一半以上的论文,声称提供从业人员的观点。尽管标题中出现了“技术”,但没有对技术问题或研究进行重大处理。在整个卷中,基本假设是攻击者可以利用漏洞同时保留自己的匿名性。结果,该卷无视可以利用有关攻击者的零散信息的智能流程,从而导致法律追究或反击,更不用说攻击者资源的渗透。几乎没有关于网络犯罪,恐怖事件或分类网络攻击的统计信息。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号