首页> 外文OA文献 >Three Models for Sharing Cybersecurity Incident Information: A Legal and Political Analysis
【2h】

Three Models for Sharing Cybersecurity Incident Information: A Legal and Political Analysis

机译:共享网络安全事件信息的三种模式:法律和政治分析

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

Though the international laws are applicable not only to the real world but also to cyberspace, the Internet is vulnerable against cyberattack, because it is fairly difficult to identify the real actor, when the attack is made by u2018botsu2019 or through anonymization methods(attribution problem). As the early Internet took for granted that the research community can maintain self-governance easily, concept of security-by-design is lacking. Hence the offenders have advantages over defenders, and the only effective measure for the defenders is the sharing of cybersecurity incident information, in order to analyze the characteristics of attack, and prepare for the next one. There are three types of sharing mechanism in the world; USA, EU, and UK models. This paper compares these models, and tries to extract some lessons for the future as well as for the other countries or areas. The most important factors for choosing the proper model are aggregated comparative advantages of defense, police, intelligence, and IT-related industry powers of the State concerned.
机译:尽管国际法不仅适用于现实世界,而且适用于网络空间,但互联网很容易受到网络攻击,因为当由 u2018bots u2019或通过匿名方法进行攻击时,很难识别出真正的参与者(归因问题)。早期的Internet认为研究团体可以轻松地维持自治是理所当然的,因此缺乏按设计进行安全性的概念。因此,犯罪者比防御者具有优势,防御者唯一有效的措施是共享网络安全事件信息,以分析攻击的特征并为下一次攻击做准备。世界上共有三种类型的共享机制。美国,欧盟和英国型号。本文对这些模型进行了比较,并试图从未来以及其他国家或地区中汲取一些教训。选择适当模型的最重要因素是有关国家的国防,警察,情报和与IT相关的行业力量的综合比较优势。

著录项

  • 作者

    Hayashi Koichiro;

  • 作者单位
  • 年度 2017
  • 总页数
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类

相似文献

  • 外文文献
  • 中文文献
  • 专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号