英文摘要 |
Recently, Cyber security has become the focus of international attention, from the past, it may simply discuss information security, becoming an international event, and even become an issue of international conference that countries are tit for tat. There are many researches are indicated directly that the part of the attack was led by particular governments with the network troops. However, the "anonymity" in the online world allows considerable distress when determining the identity of the attacker, whether the combat troops with the command of the government? Or hackers attacks? There are the difficulties to recognize. Until now, it doesn’t have a country recognize to launch cyber attacks to other countries; and now in the digital era with rapid technological progress, Hacktivism or terrorists may also launch a large-scale cyber attacks. If we can't determine the attacker, then we can’t carry out preventive measures either. This study attempts to discuss categories of cyber attacks by different attack techniques. And investigate the effect of different network attack from the major information security incidents, as well as limitations and possibility of international cooperation on counter-made. |