Organizational and legal basis for countering cyber attacks on the infrastructure of the state
Abstract
The article deals with the issue of legal counteraction to cyberattacks committed anonymously in computer systems and networks. In reviewing examples of cybercrime in world practice and analyzing the international legal regulation of the global information sphere, the author justifies the need to assign a unique identifier to each user, through which it will be possible to record and promptly receive data on illegal activities in the computer network.
PDF, ru
Received: 07/01/2019
Accepted: 08/01/2019
Accepted date: 08/30/2019
Keywords: cyber-threat; cyber-attack; anonymity; encryption; identification
Available in the on-line version with: 30.08.2019
To cite this article

