摘要
随着信息和通信技术(ICT)的迅速发展,网络恐怖主义已成为一个新的潜在威胁。ICT具有的易用性、开放式的任意自由快速传播信息、可远程控制和访问关键信息目标等功能,为网络恐怖主义造成更大范围的破坏提供了机会。基于生命周期循环模型(CLC)的网络恐怖犯罪是由准备、观察、选择、实施和治理控制等五个环节构成的。治理控制网络恐怖主义的战略对策包括加强网络安全立法,建立权威性的管理机构,完善预警系统,严格网络服务提供者的社会责任和法律责任;技术对策包括CSIRTS、入侵防御、网络监控、拦截和堵塞、灾难恢复和取证。
Along with the quick development of the information and communication technology (ICT), the cyber-terrorism has become a new latent threat. The ICT can be operated easily, spread information open, arbitrarily, freely and quickly, controlled by long distance and access key information targets etc., thus it provides opportuni-ties for cyber-terrorism. Base on the circulation of life cycle model (CLC), the cyber-terrorism crimes have five links of preparation, observation, option, implement and management. The strategies of controlling cyber-terrorism include strengthening the network security legislation, building up powerful management organization, perfecting early-warning system, and supervising the social responsibility and legal responsibility of network service providers. The technical countermeasures include CSIRTS, invading defense, network supervision, intercept and stop, disaster instauration and evidence collecting.
出处
《新疆警察学院学报》
2014年第3X期15-21,共7页
Journal of Xinjiang Police College
基金
2011年度国家社科基金资助项目"社会转型期恐怖主义犯罪治理控制研究"(11BFS103)阶段性研究成果
关键词
网络犯罪
网络恐怖主义
生命周期循环模型
治理对策
cyber-crimes
cyber-terrorism
circulation of life cycle model
management countermeasure