Abstract
The article comprehensively examines cybersecurity issues, as well as the origins and principles of hacktivism, and gives their definitions. The tools used by hacktivists in their destructive activities are examined and their classification is presented. The criminal legal characteristics of the types of crimes used by hacktivists when carrying out cyber attacks are determined. The importance and necessity of proper measures to overcome the phenomenon of hacktivism is presented. The existing criminal legal methods of countering manifestations of hacktivism, available in Russian criminal legislation, are analyzed. Measures to counter IT threats of an organizational and technical nature are proposed. The topic under study requires further collection and processing of empirical material in order to identify new methods of committing cyber attacks on critical infrastructure and developing new approaches to combating this type of crime, ensuring uniform practice. Hacktivism is a new phenomenon in the IT environment. Hacktivism does not imply material benefit from the acts committed, which makes it difficult to classify and differentiate from related groups. Thus, a scientific interpretation and elaboration of a unified conceptual apparatus is required to ensure a uniform practice of identifying and countering this type of socially dangerous acts. The article concludes that the methods practiced by hacktivists when carrying out cyber attacks are described and have their own qualifications in the criminal legislation of the Russian Federation. However, it must be taken into account that attacks are often carried out from the territory of other countries and the groups themselves are transnational. Therefore, to successfully counter these destructive phenomena, it is necessary to develop international cooperation in law enforcement and unify responsibility for such acts. Countering hacktivism requires a comprehensive approach that includes legal, technical and social components.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.