图书介绍
法律视角下的全球网络安全态势及对策 汉英对照【下载 pdf 百度网盘 epub 免费 2025 电子版 mobi 在线】

- 许坚主编 著
- 出版社: 北京:人民法院
- ISBN:9787510920523
- 出版时间:2018
- 标注页数:233页
- 文件大小:17MB
- 文件页数:255页
- 主题词:计算机网络-科学技术管理法规-研究-汉、英
PDF下载
下载说明
法律视角下的全球网络安全态势及对策 汉英对照PDF格式电子书版下载
下载的文件为RAR压缩包。需要使用解压软件进行解压得到PDF格式图书。建议使用BT下载工具Free Download Manager进行下载,简称FDM(免费,没有广告,支持多平台)。本站资源全部打包为BT种子。所以需要使用专业的BT下载软件进行下载。如BitComet qBittorrent uTorrent等BT下载工具。迅雷目前由于本站不是热门资源。不推荐使用!后期资源热门了。安装了迅雷也可以迅雷进行下载!
(文件页数 要大于 标注页数,上中下等多册电子书除外)
注意:本站所有压缩包均有解压码: 点击下载压缩包解压工具
图书目录
第一部分 日益严峻的全球网络安全形势7
一、网络威胁影响国家政治军事安全7
(一)敏感信息泄漏影响政治安全7
(二)网络攻击影响国家军事安全7
(三)网络攻击规模将会不断加剧8
二、网络的强依赖性导致灾难性后果9
(一)对工业系统的攻击波及面广9
(二)对金融系统的攻击日益严重10
(三)核设施遭打击后果难以预测11
(四)网络攻击造成社会运转瘫痪12
三、网络攻击全方位威胁商业的发展13
(一)大型关键企业是主要攻击点13
(二)网络攻击窃取金融商业机密15
(三)企业邮箱存在严重安全风险16
四、网络安全关涉每一个体切身利益19
(一)超半数网民通讯信息被泄漏19
(二)网络诈骗侵害个体财产权益21
(三)网络入侵危及个体生命安全22
五、企业网络安全防护存在严重不足24
(一)恐暴露问题而存在侥幸心理25
(二)重自身损失而忽略社会责任25
(三)动态防御应急缺乏相应意识26
第二部分 WannaCry事件分析及其反思31
一、WannaCry事件的背景及其影响31
(一)WannaCry事件的发生背景31
(二)WannaCry事件的空前影响32
二、WannaCry技术分析及攻击流程32
(一)“三位一体”新型网络病毒33
(二)WannaCry的整体攻击流程36
三、WannaCry与永恒之蓝关系分析37
(一)永恒之蓝研发及泄漏的简介37
(二)WannaCry攻击与永恒之蓝39
(三)外国军用武器民用化的初次尝试40
四、关于WannaCry事件的安全反思42
(一)企业网络安全防护现存问题42
(二)网络恐怖主义威胁逐渐显现47
(三)网络攻击向各智能终端蔓延48
(四)网络安全维护需国家和企业联动49
五、WannaCry事件的法律视角分析49
第三部分 未来网络安全热点及趋势预测53
一、网络漏洞及其攻击威胁持续蔓延53
(一)金融网站漏洞威胁更加复杂53
(二)网站挂马攻击将会重新兴起53
(三)劫持智能硬件致使隐患迭出54
二、高级持续性威胁将会呈现新特点55
(一)APT对基础设施的攻击日益活跃55
(二)对特定个人移动端攻击增多56
三、互联网应用环境安全愈加不可控57
(一)未知威胁挑战传统检测方法57
(二)安全事件挑战企业响应能力58
(三)应用环境安全越来越不可控58
(四)关键信息基础设施防护不足60
第四部分 维护网络安全的国际行为准则64
一、公共权力主体的行为准则64
(一)有责任和权力维护本国网络安全65
(二)加强漏洞管理从而减少网络威胁66
(三)妥善应对APT攻击相关网络犯罪67
(四)支持军民融合发展促进社会协作68
(五)通过国内立法进行网络武器管控69
(六)应就网络武器管控达成国际条约70
(七)建立网络武器泄露外交通报机制71
二、网络运营主体的行为准则72
(一)提供安全的网络服务和运行环境72
(二)确保网络数据和个人信息的安全73
(三)对供应链及其员工加强网络安全教育74
(四)以积极的态度参与网络安全建设74
(五)建立数据驱动协同联动防御体系76
(六)建立有效网络安全应急响应体系77
三、网络安全企业的行为准则78
(一)规范网络安全漏洞挖掘行为78
(二)保障网络用户个人信息安全79
(三)参与网络安全信息共享活动79
(四)应对网络安全重大突发事件80
四、网络用户主体的行为准则81
(一)加强网络安全意识,抵御网络安全威胁81
(二)承担依法用网责任,履行文明上网义务82
(三)利用投诉举报机制,发挥社会监督作用83
第五部分 维护网络空间安全的中国行动87
一、维护网络安全法律路径87
(一)确立科学的网络安全立法思路87
(二)强调预防对网络安全维护的重要性89
(三)通过法律解释合理化法律适用89
二、加强网络安全支持力度90
(一)通过政治决策强调网络安全重要性90
(二)立法保障信息共享和人才培养91
(三)提高网络安全保障的财政投入94
三、着力培养网络安全人才95
(一)网络安全人才培养纳入国家战略95
(二)建立世界一流网络安全学院96
(三)增强网络安全教育的实践性97
四、落实网络安全保障义务98
(一)更新服务提供者的安全理念98
(二)强化对网络主体行为的管理98
(三)建立网络安全责任追究机制99
PART Ⅰ THE INCREASINGLY SERIOUS GLOBAL NETWORK SECURITY SITUATIONS109
1.CYBER THREATS IMPACT NATIONAL POLITICAL AND MILITARY SECURITY109
(1) LEAKAGE OF SENSITIVE INFORMATION IMPACTS THE POLITICAL SECURITY109
(2) THE ATTACKS OF CYBER AFFECTS NATIONAL MILITARY SECURITY110
(3) THE SCALE OF CYBER ATTACKS WILL BE INCREASING110
2.THE HEAVY DEPENDENCY ON THE INTERNET BRINGS ABOUT CATASTROPHIC CONSEQUENCES111
(1) THE ATTACKS ON THE INDUSTRIAL SYSTEM HAVE A WIDE COVERAGE112
(2) THE ATTACKS ON FINANCIAL SYSTEM ARE MORE AND MORE SERIOUS113
(3) IT IS DIFFICULT TO PREDICT THE CONSEQUENCES OF ATTACKS TO NUCLEAR FACILITIES114
(4) CYBER ATTACKS CAUSE PARALYSIS TO SOCIAL OPERATION116
3.CYBER ATTACKS COMPREHENSIVELY THREATEN THE BUSINESS DEVELOPMENT118
(1) LARGE KEY ENTERPRISES ARE THE MAIN ATTACKED POINTS118
(2) THE ATTACKS OF CYBER STEAL FINANCIAL BUSINESS SECRETS120
(3) THERE IS A SERIOUS SECURITY RISK IN ENTERPRISE MAILBOX121
4.CYBER SECURITY IS RELATED TO EACH INDIVIDUAL’S VITAL INTERESTS126
(1) MORE THAN HALF OF INTERNET USERS’ COMMUNICATION INFORMATION IS LEAKED126
(2) CYBER FRAUD INFRINGES INDIVIDUAL PROPERTY RIGHTS AND INTERESTS128
(3) CYBER INTRUSION ENDANGERS INDIVIDUAL LIFE SECURITY130
5.THE ENTERPRISE CYBER SECURITY PROTECTION EXISTS SERIOUS INSUFFICIENCE132
(1) FEAR OF EXPOSURE PROBLEMS AND HAVE FLUKE MIND132
(2) FOCUSING ON THEIR OWN LOSSES AND IGNORING SOCIAL RESPONSIBILITY133
(3) LACK OF CORRESPONDING AWARENESS OF DYNAMIC DEFENSE AND EMERGENCY RESPONSE134
PART Ⅱ WANNACRY INCIDENT ANALYSIS AND ITS REFLECTION134
1.THE BACKGROUND OF WANNACRY INCIDENT AND ITS EFFECTS139
(1) THE BACKGROUND OF WANNACRY INCIDENT139
(2) THE UNPRECEDENTED EFFECT OF THE WANNACRY INCIDENT140
2.WANNACRY TECHNICAL ANALYSIS AND ATTACK PROCESS141
(1) “TRINITY” NEW INTERNET VIRUS141
(2) WANNACRY’ S OVERALL ATTACK PROCESS145
3.ANALYSIS OF THE RELATIONSHIP BETWEEN WANNACRY AND THE ETERNAL BLUE146
(1) BRIEF INTRODUCTION TO ETERNAL BLUE R & D AND LEAKAGE146
(2) WANNACRY ATTACK AND THE ETERNAL BLUE148
(3) THE INITIAL ATTEMPT OF CIVILIAN USE OF MILITARY WEAPONS150
4.SECURITY REFLECTION ON WANNACRY INCIDENT152
(1) EXISTING PROBLEMS OF ENTERPRISE CYBER SECURITY PROTECTION152
(2) THE THREAT OF CYBER TERRORISM IS EMERGING159
(3) CYBER ATTACKS SPREAD TO THE INTELLIGENT TERMINALS160
(4) CYBER SECURITY MAINTENANCE NEEDS NATIONAL AND ENTERPRISE LINKAGE161
5.ANALYSIS OF WANNACRY INCIDENT FROM LEGAL PERSPECTIVE162
PART Ⅲ THE FUTURE CYBER SECURITY HOT SPOTS AND TREND FORECAST167
1.THE NETWORK VULNERABILITIES AND THEIR THREAT OF ATTACK CONTINUES TO SPREAD167
(1) FINANCIAL SITES’ VULNERABILITY THREATS ARE MORE COMPLEX167
(2) EMBEDDING TROJAN IN SITE WILL BE RE-EMERGING168
(3) HIJACK SMART HARDWARE TO CAUSE HIDDEN DANGER169
2.THE HIGH-LEVEL SUSTAINABLE THREAT WILL SHOW NEW FEATURES170
(1) ATTACKS ON INFRASTRUCTURE ARE BECOMING INCREASINGLY ACTIVE170
(2) ATTACKS ON SPECIFIC INDIVIDUAL MOBILE TERMINALS INCREASE171
3.INTERNET APPLICATION ENVIRONMENT SECURITY IS INCREASINGLY UNCONTROLLABLE173
(1) UNKNOWN THREATS CHALLENGE TRADITIONAL DETECTION METHODS173
(2) SECURITY INCIDENTS CHALLENGE ENTERPRISE RESPONSE CAPABILITIES174
(3) THE APPLICATION ENVIRONMENT SECURITY IS MORE AND MORE UNCONTROLLABLE175
(4) LACK OF PROTECTION FOR CRITICAL INFORMATION INFRASTRUCTURE177
PART Ⅳ INTERNATIONAL CODE OF CONDUCT FOR CYBER SECURITY MAINTENANCE183
1.THE CODE OF CONDUCT FOR PUBLIC POWER SUBJECTS183
(1) HAVE THE RESPONSIBILITY AND POWER TO MAINTAIN THEIR OWN COUNTRY’S CYBER SECURITY184
(2) STRENGTHEN VULNERABILITY MANAGEMENT TO REDUCE CYBER THREATS186
(3) PROPERLY DEAL WITH CYBER CRIMES RELATED TO APT ATTACKS187
(4) SUPPORT MILITARY AND CIVILIAN INTEGRATED DEVELOPMENT AND PROMOTE SOCIAL COOPEIRATION189
(5) CONTROL CYBER WEAPONS THROUGH DOMESTIC LEGISLATION190
(6) INTERNATIONAL TREATIES ON CYBER WEAPON CONTROL SHOULD BE REACHED192
(7) ESTABLISH A DIPLOMATIC REPORTING MECHANISM FOR THE DISCLOSURE OF CYBER WEAPONS194
2.NETWORK OPERATORS’ CODE OF CONDUCT195
(1) PROVIDE A SECURE NETWORK SERVICE AND OPERATING ENVIRONMENT195
(2) ENSURE THE SECURITY OF NETWORK DATA AND PERSONAL INFORMATION196
(3) STRENGTHEN THE CYBER SECURITY EDUCATION FOR SUPPLY CHAIN AND ITS STAFF198
(4) TAKE A POSITIVE ATTITUDE TO PARTICIPATE IN CYBER SECURITY CONSTRUCTION198
(5) ESTABLISH A DATA-DRIVEN COLLABORATIVE DEFENSE SYSTEM201
(6) ESTABLISH AN EFFECTIVE CYBER SECURITY EMERGENCY RESPONSE SYSTEM202
3.CYBER SECURITY ENTERPRISES’ CODE OF CONDUCT204
(1) REGULATE THE CYBER SECURITY VULNERABILITY EXCAVATING BEHAVIOR204
(2) PROTECT THE NETWORK USERS’ PERSONAL INFORMATION SECURITY205
(3) PARTICIPATE IN CYBER SECURITY INFORMATION SHARING ACTIVITIES206
(4) DEAL WITH SUDDEN MAJOR CYBER SECURITY INCIDENTS207
4.NETWORK USERS’ CODE OF CONDUCT208
(1) STRENGTHEN THE AWARENESS OF CYBER SECURITY, RESIST THE THREAT OF CYBER SECURITY208
(2) BEAR THE RESPONSIBILITY OF USING THE INTERNET ACCORDING TO LAW, PERFORM THE OBLIGATION OF GOING ON-LINE WITH CIVILITY209
(3) TAKE USE OF COMPLAINTS AND REPORTING MECHANISM,PLAY A ROLE OF SOCIAL SUPERVISION210
PART Ⅴ CHINA’ S ACTIONS TO MAINTAIN CYBERSPACE SECURITY215
1.LEGAL PATH FOR THE MAINTENANCE OF CYBER SECURITY215
(1) ESTABLISH A SCIENTIFIC CYBER SECURITY LEGISLATION IDEAS215
(2) STRESS THE IMPORTANCE OF PREVENTION TO CYBER SECURITY218
(3) RATIONALIZE LAW APPLICATION THROUGH LEGAL INTERPRETATION219
2.STRENGTHEN CYBER SECURITY SUPPORT220
(1) STRESS THE IMPORTANCE OF CYBER SECURITY THROUGH POLITICAL DECISION-MAKING220
(2) PROTECT INFORMATION SHARING AND PERSONNEL TRAINING BY LEGISLATION221
(3) IMPROVE THE FINANCIAL INPUT IN PROTECTION OF CYBER SECURITY226
3.FOCUS ON TRAINING CYBER SECURITY TALENTS227
(1) INCORPORATE TRAINING OF CYBER SECURITY TALENTS INTO THE NATIONAL STRATEGY227
(2) ESTABLISH A WORLD FIRST-CLASS CYBER SECURITY INSTITUTE229
(3) ENHANCE THE PRACTICALITY OF CYBER SECURITY EDUCATION230
4.IMPLEMENT OBLIGATIONS OF MATAINING CYBER SECURITY231
(1) UPDATE THE SERVICE PROVIDER‘S SECURITY CONCEPTION231
(2) STRENGTHEN THE MANAGEMENT OF THE BEHAVIOR OF CYBER SUBJECTS232
(3) ESTABLISH CYBER SECURITY ACCOUNTABILITY MECHANISM232
热门推荐
- 459991.html
- 3315651.html
- 736177.html
- 1395416.html
- 3102181.html
- 83449.html
- 2228567.html
- 2781511.html
- 2260935.html
- 3500778.html
- http://www.ickdjs.cc/book_141987.html
- http://www.ickdjs.cc/book_2064199.html
- http://www.ickdjs.cc/book_1987047.html
- http://www.ickdjs.cc/book_1032769.html
- http://www.ickdjs.cc/book_3256225.html
- http://www.ickdjs.cc/book_776263.html
- http://www.ickdjs.cc/book_59609.html
- http://www.ickdjs.cc/book_3896274.html
- http://www.ickdjs.cc/book_502863.html
- http://www.ickdjs.cc/book_1625671.html