Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Computer security
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
==Legal issues and global regulation== International legal issues of cyber attacks are complicated in nature. There is no global base of common rules to judge, and eventually punish, cybercrimes and cybercriminals - and where security firms or agencies do locate the cybercriminal behind the creation of a particular piece of [[malware]] or form of [[Cyber-Attacks|cyber attack]], often the local authorities cannot take action due to lack of laws under which to prosecute.<ref name="ted.com">{{cite web |title=Mikko Hypponen: Fighting viruses, defending the net |url=http://www.ted.com/talks/mikko_hypponen_fighting_viruses_defending_the_net.html |publisher=TED |url-status=live |archive-url=https://web.archive.org/web/20130116010603/http://www.ted.com/talks/mikko_hypponen_fighting_viruses_defending_the_net.html |archive-date=16 January 2013 }}</ref><ref>{{cite web |title=Mikko Hypponen β Behind Enemy Lines | date=9 December 2012 |url=https://www.youtube.com/watch?v=0TMFRO66Wv4 |publisher=Hack in the Box Security Conference |url-status=live |archive-url=https://web.archive.org/web/20161125075257/https://www.youtube.com/watch?v=0TMFRO66Wv4 |archive-date=25 November 2016 }}</ref> Proving [[cyber attribution|attribution for cybercrimes and cyberattacks]] is also a major problem for all law enforcement agencies. "[[Computer viruses]] switch from one country to another, from one jurisdiction to another β moving around the world, using the fact that we don't have the capability to globally police operations like this. So the Internet is as if someone [had] given free plane tickets to all the online criminals of the world."<ref name="ted.com" /> The use of techniques such as [[dynamic DNS]], [[fast flux]] and [[Bulletproof hosting|bullet proof servers]] add to the difficulty of investigation and enforcement.
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)