Font Size: a A A

Research On The Measures Of Cyber Terrorism Crime Under The Background Of Big Data

Posted on:2019-02-14Degree:MasterType:Thesis
Country:ChinaCandidate:C Y XiaFull Text:PDF
GTID:2416330596452285Subject:Litigation law
Abstract/Summary:PDF Full Text Request
The development of information network technology has brought great convenience to our lives,but it has also provided a “hotbed” for the raging of cyber terrorists.Terrorist's use of the Internet for propaganda,recruitment,fund-raising,theft or cyberattacks has caused great troubles to the harmony and stability of the social order and seriously threatens the security of the national cyberspace.However,the disorder,boundlessness,concealment,complexity,real-time nature,and high-expansion of cyberspace have brought us many troubles in combating and preventing cyber terrorism crime.The traditional investigation methods and investigation techniques are also difficult to play an effective role.The arrival of the era of big data and the development of cloud computing technologies have provided us with an opportunity to combat cyber terrorism crimes in real time.The function of big data panoramic monitoring and the efficient distributed processing of cloud computing provide technical support for real-time monitoring of network space.In recent years,the wide application and rapid development of big data industry provide us with a realistic foundation.So in the era of big data,the development of cyber terrorism crime and how to construct a sound system to deal with the crime around big data will be the focus of this article,mainly from the following three parts:The first part is an overview of cyber terrorism crime and big data.This part begins with the tracing of the terminology of cyber terrorism crime,defines its conception according to the opinions of domestic and foreign scholars,and distinguishes the difference from other related concepts,and clarifies the foundation of the research.Then it analyzes the four main forms of cyber terrorism crime.In addition,it is an explanation of the complementary functions of big data,big data andcloud computing.Then analyzes why big data is the inevitable choice to deal with the cyber terrorism crime.The first is that the characteristics of cyber terrorism crime that are highly concealed and destructive are objective requirements.And the rapid development of the network and the seriousness of the cyber terrorism crime all determine that we must learn from the advantages of big data to break this predicament.Then discusses the improvement of big data technology as well as its various functions,especially the realization of predictive functions for the fight against cyber terrorism crime superiority.The second part studies the construction of the legal system to deal with the cyber terrorism crime in extra-territorial countries and the positive measures taken.Mainly the United States,Russia,Britain's network security strategy were analyzed.Basically from the formulation of the top strategy to improve the legal system,increase government investment,pay attention to key infrastructure,focus on innovation and development,personnel training mechanisms and many other channels to deal with the harsh situation of cyber terrorism crime.From which we can provide a lot of good experience for us to build our own network security strategy.The third part outlines how to build an anti-cyber terrorism system based on the background of big data.The first is to raise cyberspace security to the strategic height of national security,and improve the existing laws and regulations from the three aspects of the criminal law system,network security,and big data supporting regulations to build a foundation for system protection.Followed by the construction of automated monitoring and early warning and protection of big data platform to deal with cyber terrorism system frequently,highlighting the early warning mechanism.And in order to effectively run a big data anti-terrorism system,it is also necessary to establish a specialized and independent institution and pay attention to personnel training mechanism.Then proposed to advocate research and innovation and upgrade the level of independence so as to grasp the initiative of network security maintenance.And it is necessary to strengthen cooperation with the enterprises in the communications network as well as the international community,promote the global governance of the Internet and build a cyberspace of peace,security,openness and cooperation.
Keywords/Search Tags:cyber terrorism crime, big data, extraterritorial experience, early warning mechanism
PDF Full Text Request
Related items