您好,欢迎来到皮书数据库!
热点推荐: 双循环
更多>> 课题组动态
更多>> 皮书作者
谢伏瞻
    中国社会科学院学部委员,学部主席团主席,研究员,博士生导师。历任中国社会科学院院长、党组书记,国务院发展中心副主... 详情>>
蔡 昉
    中国社会科学院国家高端智库首席专家,学部委员,学部主席团秘书长,研究员,博士生导师。先后毕业于中国人民大学、中国... 详情>>
李培林
    男,汉族,出生于1955年5月,山东济南人,博士,研究员,全国人民代表大会社会建设委员会副主任委员,中国社会科学... 详情>>

    网络安全漏洞挖掘的法律规制研究

    • 作者:赵精武出版日期:2018年12月
    • 报告大小:1.05MB
    • 报告字数:19609 字所属丛书:
    • 所属图书:科技创新与法治保障

    摘要

    网络安全漏洞的挖掘、披露、交易、修复日益成为各国网络安全治理的中心议题。“袁炜案”直接表明了我国现行法对网络安全漏洞挖掘行为的否定性态度,《刑法》第285条前两款对善意黑客的漏洞挖掘行为构成了不当限制,应当通过《网络安全法》第26条对其在漏洞挖掘领域的适用进行严格的限缩解释,并围绕《网络安全法》从立法论的角度重塑漏洞管理机制。在充分考虑网络安全漏洞自身动态性、复杂性、开放性的基础上,从国家安全的高度把握漏洞挖掘治理,健全漏洞挖掘立法体系;完善漏洞库并配套漏洞评级机制;明确公私合作框架,对挖掘主体进行备案;在遵循现有实践的基础上对挖掘行为分级授权,并进一步强化漏洞的跨境流动应对。

    <<
    >>

    Abstract

    The exploration,disclosure,transaction,and renovation of Cyber-security vulnerabilities has increasingly become a central issue of Cyber-security governance. As private citizens identify software flaws and vulnerabilities,it is important that there is a legal means to allow them to positively contribute to security without threat of criminal penalization. The “Yuan Wei case” has shown the negative attitude Chinese criminal law has towards private citizens exploring Cyber-security vulnerabilities. Subsection 1 and 2 of Article 285 of Criminal Law outlines improper restrictions to the vulnerability exploration of ethical hackers. However,Article 26 of the Cyber-security Law-which outlines the application and scope of vulnerability exploration-should be used to remodel and improve the mechanisms for vulnerability management. Therefore,we must consider the dynamics,complexity,and openness of cyber security vulnerabilities;grasp the governance of vulnerability exploration;improve the legislative system of vulnerability exploration from the height of national security;perfect the vulnerability database and match the vulnerability rating mechanism;clarify the public-private cooperation framework,and disclosure procedure;authorize whom has access to exploration levels according to standard practices;and further strengthen the cross-border flow response to vulnerabilities.

    <<
    >>
    作者简介
    赵精武:赵精武,北京航空航天大学法学院网络信息安全方向博士研究生(计算机学院联合培养),研究方向为网络安全法、民商法。
    <<
    >>
    相关报告