Font Size: a A A

Identify International Legal Liability Of Cyber Attack

Posted on:2021-05-13Degree:MasterType:Thesis
Country:ChinaCandidate:H WangFull Text:PDF
GTID:2416330626959664Subject:Law
Abstract/Summary:PDF Full Text Request
In the face of the complex international environment in today's world,while cyberspace brings convenience to people,people all over the world are closely linked,but at the same time,the challenges brought by cyberspace are everywhere.As the world has experienced the baptism of the two world wars,the international community has learned the lessons of the war.Through the establishment of the United Nations and the corresponding international treaties,all forces in the world can avoid large and uncontrollable armed conflicts.In the face of disputes between countries,the International Court of justice and some international dispute settlement agencies can become the international way for countries to solve their disputes by law Therefore,to a certain extent,it also promotes the stability of the international community.After all,every country does not want to be an image of a destroyer of stability and peace that the international community considers.However,with the large-scale use of Internet in the 21 st century,due to the concealment and high technology of cyberspace,cyber attacks have become the best way to evade the current international legal system,and some countries choose to attack other countries to obtain political and economic benefits.Because of the lag of international law,new international law and international rules will appear only when disasters happen to regulate these behaviors.Because of the anonymity of cyber attacks,it is very difficult to attribute these behaviors to the behaviors of states.However,there are few legal norms of cyber attacks in today's international law.So far,no international law document on cyber attacks has been adopted,Therefore,this paper mainly discusses the application of international law in cyberspace,mainly from the following four chapters: the first chapter,the definition and characteristics of cyber attack,mainly distinguish between cyber attack andcyber crime,cyber war and cyber espionage,and summarize the new characteristics and characteristics of cyber attack.The second chapter,the attribution of cyber attacks,mainly analyzes how to attribute the non-state subject behavior of cyber attacks to the State subject behavior,and the legal issues of evidence proof that may be involved in the process of attribution.Third,in the face of network attacks,this paper mainly discusses how to take corresponding countermeasures against network attacks under the system of the United Nations,through regional cooperation organizations,and between countries.Fourth,under the network attack,some suggestions for the possible...
Keywords/Search Tags:network attack, countermeasures, the rule of evidence, On the attribution of cyber attacks
PDF Full Text Request
Related items