定义网络威胁背景下的关键信息基础设施:隐私视角

ID:25531

大小:0.19 MB

页数:10页

时间:2022-12-01

金币:15

上传者:战必胜
1
Defining Critical Information Infrastructure
in the Context of Cyber Threats:
The Privacy Perspective
Eneken TIKK
1
Cooperative Cyber Defence Centre of Excellence Tallinn, Estonia
Head of the Legal Task Team
eneken.tikk@ccdcoe.org
Introduction
About a year ago, NATO adopted two documents that will shape the way cyber
incidents of concern to (inter)national security will be managed.
2
The cooperative
aspect of managing cyber incidents of relevance for NATO will require national
regulatory action in regard to defining the critical information infrastructure and
providing a proper legal basis for information exchange between NATO and its
member states.
Cyber incidents may range anywhere from simple deviations from internal security
regulations to criminal acts, acts of cyber terrorism, and even warfare. The
investigation and management of such incidents is based on sharing and comparing
traffic data and server logs, including IP addresses. Countries subject to both the EU
and NATO organisational framework of cyber defence
3
will face difficulties
transferring such data to NATO or another member state‟s national authorities since the
legal view governing EU data protection institutions categorises IP addresses and logs
as personal data.
The EU legal framework on data privacy thus creates obstacles to processing cyber
incident data for the purpose of cooperative cyber defence management. While there
are legally safe ways to secure evidence and manage cyber incidents, recent trends in
EU member states require that more attention be paid to these issues on the national
regulatory level.
1
Eneken Tikk works as the Legal Advisor to the NATO Cooperative Cyber Defence Centre of Excellence
(“CCD COE”) and is currently the Research Fellow for the Center for Infrastructure Protection of the
George Mason University Law School.
2
NATO Cyber Defence Concept (MC, 13 March 2008), based on the NATO Cyber Defence Policy (NAC,
20 December 2007).
3
While there is no internationally accepted legal definition of cyber threats (one of the key reasons for
difficulties related to the implementation of personal data protection rules), the concerns of cyber security
involve stakeholders such as international organisations, governments, the private sector and IT infrastructure
providers, as well as home users. The incidents that may affect the functioning of a society‟s critical
infrastructure may initially occur as simple human error and the deviation from internal information security
regulations, or they may turn out to be intentional, often politically motivated, criminal activities or
coordinated and well-targeted attacks that support other hostile activities towards the entity or nation in
question. Therefore, the term cyber defence” is to be understood to cover the prevention of and potential
responses to different types and levels of cyber threats.
资源描述:

当前文档最多预览五页,下载文档查看全文

此文档下载收益归作者所有

当前文档最多预览五页,下载文档查看全文
温馨提示:
1. 部分包含数学公式或PPT动画的文件,查看预览时可能会显示错乱或异常,文件下载后无此问题,请放心下载。
2. 本文档由用户上传,版权归属用户,天天文库负责整理代发布。如果您对本文档版权有争议请及时联系客服。
3. 下载前请仔细阅读文档内容,确认文档内容符合您的需求后进行下载,若出现内容与标题不符可向本站投诉处理。
4. 下载文档时可能由于网络波动等原因无法下载或下载错误,付费完成后未能成功下载的用户请联系客服处理。
关闭