2025年6月26日 周四
Research on the construction of information disclosure mechanism of cyber security event
CSTR:
Author:
  • Article
  • | |
  • Metrics
  • |
  • Reference [15]
  • |
  • Related [20]
  • | | |
  • Comments
    Abstract:

    With the rapid development of Internet and information technology, cyber security has more and more influence on national economy, social life and even national security. At the same time, banking, telecommunications networks, government departments and other key infrastructure, large-scale commercial websites, cloud services, industrial Internet are increasingly becoming the focus of cyber attacks; and cyber security and security incidents of basic network, important information systems, common software and hardware vulnerabilities, large web sites and personal information leakage are serious, which has threatened data and personal information security, social stability and national security. Cyber security event information disclosure mechanism can effectively prevent and control the risk and threat of cyber information security, such as malicious software, vulnerability risk, data leakage and so on. "Cyber Security Act" (Draft) established the corresponding information disclosure provisions. Therefore, to further clarify the responsibility of the main body of the cyber space and effectively manage and regulate the risk of cyber security incidents, it is practical necessity to construct the effective information disclosure mechanism of cyber security event .

    Reference
    [1] 马民虎.网络信息安全保障的法律监管研究[M].西安:陕西科学技术出版社,2007.
    [2] 张乐,郝文江,武捷.美国网络入侵信息披露制度简介[C]//全国计算机安全学术交流会论文集(第二十五卷).合肥:中国科学技术大学出版社,2010:121.
    [3] 李国敏.2014年重大网络安全事件回顾[N].科技日报,2014-12-24(11).
    [4] 佚名.美发现新浏览器攻击模式:可监控全球八成PC[EB/OL].[2015-04-24].http://www.cnnic.net.cn/gjymaqzx/aqgg/aqggaqsj/201504/t20150424_52123.htm.
    [5] 国家计算机网络应急技术处理协调中心.2014年中国互联网网络安全报告[M].北京:人民邮电出版社,2015:15.
    [6] 国家互联网应急中心.网络安全信息与动态周报(2016年第39期)[EB/OL].[2016-09-30].http://www.cert.org.cn/publish/main/upload/File/2016CNCERT39.pdf.
    [7] 肖前忠.年终盘点:2014年国内和国际网络信息安全大事件[EB/OL].[2015-03-10].http://www.d1net.com/security/news/326109.html.
    [8] 国家计算机网络应急技术处理协调中心. 2015年我国互联网网络安全态势综述[EB/OL].[2016-05-01].http://www.cert.org.cn/publish/main/upload/File/2015%20Situation.pdf.
    [9] 赵丽莉.基于过程控制理念的网络安全法律治理研究——以"风险预防与控制"为核心[J].情报杂志,2015(8):177-181.
    [10] TROPE R L,HUGHES S J.The SEC staff's "Cybersecurity Disclosure" guidance:Will it help investors or cyber-thieves more?[J].Business Law Today,2011:1-4.
    [11] 赵丽莉.论版权技术保护措施信息安全遵从义务——以法国《信息社会版权与邻接权法》第15条为视角[J].情报理论与实践,2012(12):32-36.
    [12] SALES N A.Regulating cyber-security[J].Northwestern University Law Review,2013,107(4):1508-1564.
    [13] 罗斯科·庞德.通过法律的社会控制——法律的任务[M].沈宗灵,董世忠,译.北京:商务印书馆,1984:42.
    [14] MATWYSHYN A M.Hidden engines of destruction:the reasonable expection of code safety and the duty to warn in digital products[J].Florida Law Review,2010(62):109-157.
    [15] DYCUS S.Congress's role in cyber warfare[J].Journal of National Security Law & Policy,2010,4(1):155-171.
    Cited by
    Comments
    Comments
    分享到微博
    Submit
Get Citation

赵丽莉,钟晗.论网络安全事件信息披露机制的建构[J].重庆大学学报社会科学版,2017,23(1):109~114

Copy
Share
Article Metrics
  • Abstract:1606
  • PDF: 1663
  • HTML: 726
  • Cited by: 0
History
  • Received:November 23,2016
  • Online: January 21,2017
Article QR Code