The attack on the computer networks and mezhd.gum.pravo

High-quality master's thesis on the topic: "The attack on the computer networks and international humanitarian law", protected by perfectly well in 2013. Used 21 legal act, 60 sources of scientific literature, 3 cases of judicial practice.
TABLE OF CONTENTS


INTRODUCTION 3

Chapter I. Formation and features of legal regulation of the use of computer networks. 7

1. History of development and regulation of information technology and computer networks. 7

2. The legal basis for the functioning of information and computer systems. 12

Chapter II. Regulation sharing computer networks in modern international law. 15

1. The role of the principles of international humanitarian law as applied to computer network attacks. 15

2. International law regulating cybersecurity. 29

3. Vectors of national legal regulation of cybersecurity 41

Chapter III. Legal problems associated with the armed conflict leading through computer networks. 49

1. the application of international law of armed conflict in the information and computer networks. 49

2. The legal consequences of an attack on computer networks. 60

CONCLUSION 73

REFERENCES 78


INTRODUCTION


An important feature of the current in the XX century, the international system is its close connection with a variety of integration processes taking place in today's world. It should be noted that the integration process, initially emerged within individual regions becoming more universal significance. The integration is carried out not only in the economic and social sphere, but also in the political, legal, cultural and scientific-technical spheres. Given that the number of science and technology now is global, scientific and technological progress is not only the field of integration, but also a necessary means of expanding political, economic, social and cultural cooperation of States and relations between people.

"Computer Network Attack - this operation violation, deterioration or destruction of data stored in computers and computer networks, or prevent access to it, as well as disruption of operations, impairment or destruction of computers and networks themselves."