从黑到白:西班牙对道德黑客的监管

Cristina Del-Real, María José Rodriguez Mesa
{"title":"从黑到白:西班牙对道德黑客的监管","authors":"Cristina Del-Real, María José Rodriguez Mesa","doi":"10.1080/13600834.2022.2132595","DOIUrl":null,"url":null,"abstract":"ABSTRACT Cyber-attacks are exponentially growing, and their impact on systems, people, and organizations increases. Among other challenges, cyber-attacks prevention must tackle the fact that many software systems are marketed with security vulnerabilities due to the companies’ need to reduce time-to-market. One strategy to reduce security vulnerabilities is ethical hacking. However, while ethical hacking can bring many advantages, it also comes with many challenges. This paper introduces a comprehensive study of the possibilities and limitations of ethical hacking in Spain, both empirical and normative. On the empirical side, the paper presents the results of a Delphi study with cyber security experts in Spain on their opinions about the regulation of ethical hacking. In the normative study, the paper critically reviews the possibilities open by the International, European and Spanish law for regulating ethical hacking. The conclusions of this paper offer a roadmap for harnessing ethical hacking to improve cyber security.","PeriodicalId":44342,"journal":{"name":"Information & Communications Technology Law","volume":null,"pages":null},"PeriodicalIF":1.8000,"publicationDate":"2022-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"From black to white: the regulation of ethical hacking in Spain\",\"authors\":\"Cristina Del-Real, María José Rodriguez Mesa\",\"doi\":\"10.1080/13600834.2022.2132595\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"ABSTRACT Cyber-attacks are exponentially growing, and their impact on systems, people, and organizations increases. Among other challenges, cyber-attacks prevention must tackle the fact that many software systems are marketed with security vulnerabilities due to the companies’ need to reduce time-to-market. One strategy to reduce security vulnerabilities is ethical hacking. However, while ethical hacking can bring many advantages, it also comes with many challenges. This paper introduces a comprehensive study of the possibilities and limitations of ethical hacking in Spain, both empirical and normative. On the empirical side, the paper presents the results of a Delphi study with cyber security experts in Spain on their opinions about the regulation of ethical hacking. In the normative study, the paper critically reviews the possibilities open by the International, European and Spanish law for regulating ethical hacking. The conclusions of this paper offer a roadmap for harnessing ethical hacking to improve cyber security.\",\"PeriodicalId\":44342,\"journal\":{\"name\":\"Information & Communications Technology Law\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":1.8000,\"publicationDate\":\"2022-10-21\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Information & Communications Technology Law\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1080/13600834.2022.2132595\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"LAW\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Information & Communications Technology Law","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1080/13600834.2022.2132595","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"LAW","Score":null,"Total":0}
引用次数: 2

摘要

网络攻击呈指数级增长,其对系统、人员和组织的影响也在增加。在其他挑战中,网络攻击预防必须解决这样一个事实,即由于公司需要缩短上市时间,许多软件系统在市场上存在安全漏洞。减少安全漏洞的一个策略是道德黑客。然而,尽管道德黑客可以带来许多优势,但它也带来了许多挑战。本文介绍了西班牙伦理黑客的可能性和局限性的全面研究,包括经验和规范。在实证方面,本文介绍了与西班牙网络安全专家就其对道德黑客监管的看法进行德尔菲研究的结果。在规范研究中,本文批判性地回顾了国际、欧洲和西班牙法律在规范道德黑客行为方面所开放的可能性。本文的结论为利用道德黑客来提高网络安全提供了路线图。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
From black to white: the regulation of ethical hacking in Spain
ABSTRACT Cyber-attacks are exponentially growing, and their impact on systems, people, and organizations increases. Among other challenges, cyber-attacks prevention must tackle the fact that many software systems are marketed with security vulnerabilities due to the companies’ need to reduce time-to-market. One strategy to reduce security vulnerabilities is ethical hacking. However, while ethical hacking can bring many advantages, it also comes with many challenges. This paper introduces a comprehensive study of the possibilities and limitations of ethical hacking in Spain, both empirical and normative. On the empirical side, the paper presents the results of a Delphi study with cyber security experts in Spain on their opinions about the regulation of ethical hacking. In the normative study, the paper critically reviews the possibilities open by the International, European and Spanish law for regulating ethical hacking. The conclusions of this paper offer a roadmap for harnessing ethical hacking to improve cyber security.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
CiteScore
3.10
自引率
0.00%
发文量
17
期刊介绍: The last decade has seen the introduction of computers and information technology at many levels of human transaction. Information technology (IT) is now used for data collation, in daily commercial transactions like transfer of funds, conclusion of contract, and complex diagnostic purposes in fields such as law, medicine and transport. The use of IT has expanded rapidly with the introduction of multimedia and the Internet. Any new technology inevitably raises a number of questions ranging from the legal to the ethical and the social. Information & Communications Technology Law covers topics such as: the implications of IT for legal processes and legal decision-making and related ethical and social issues.
期刊最新文献
When objects betray you: the Internet of Things and the privilege against self-incrimination From object obfuscation to contextually-dependent identification: enhancing automated privacy protection in street-level image platforms (SLIPs) Balancing the autonomy and protection of children: competency challenges in data protection law Fidelity in legal coding: applying legal translation frameworks to address interpretive challenges The role of corporate social responsibility in the regulation of OTT platforms: the case of film industry and Turkish corporate law
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1