新书报道
当前位置: 首页 >> 电类优秀教材 >> 正文
Chinese Cybersecurity and Cyberdefense
发布日期:2015-12-17  浏览

Chinese Cybersecurity and Cyberdefense

[Book Description]

Cyberdefense has become, over the past five years, a major issue on the international scene. China, by the place it occupies, is the subject of attention: it is observed, criticized, and designated by many states as a major player in the global cyber-insecurity. The United States is building their cyberdefense strategy against what they call the "Chinese threat." It is therefore important to better understand today's challenges related to cyber dimension in regard of the rise of China. Contributions from international researchers provide cross perspectives on China, its strategies and policies for cybersecurity and cyberdefense. These issues have now gained major strategic dimension: Is Cyberspace changing the scene of international relations? How China does apprehend cybersecurity and cyberdefense? What are the issues, challenges? What is the role of China in the global cyberspace?

[Table of Contents]
Author Biographies                                 xi
Introduction                                       xv
Chapter 1 China's Internet Development And         1  (54)
Cybersecurity - Policies And Practices
          Xu Longdi
    1.1 Introduction                               1  (1)
    1.2 Internet development in China: an          2  (3)
    overview
    1.3 China's policies towards Internet          5  (4)
    development
      1.3.1 From the very beginning of its         6  (2)
      development, China's Internet has been
      closely linked to the Chinese economy,
      and was programmed and integrated into
      its macro economic development blueprints
      1.3.2 In addition to lending full policy     8  (1)
      support to Internet development, China
      also invests heavily in building Internet
      infrastructures.
      1.3.3 The Chinese government actively        8  (1)
      promotes the R&D of next-generation
      Internet (NGI).
      1.3.4 China practices a policy of            9  (1)
      managing cyber affairs in line with law,
      adhering to the principles of scientific
      and effective administration in its
      Internet governance
    1.4 Cyber legislation and Internet             9  (18)
    administration
      1.4.1 Basic principles and practices of      10 (6)
      Internet administration in China
      1.4.2 Guaranteeing the free and secure       16 (11)
      flow of information in cyberspace
    1.5 Cybersecurity and diplomacy: an            27 (14)
    international perspective
      1.5.1 Cyber policy dialogue and              28 (2)
      consultation
      1.5.2 Regional cyber cooperation             30 (2)
      1.5.3 Track II cyber diplomacy               32 (1)
      1.5.4 Legal cooperation in combating         33 (2)
      cybercrimes
      1.5.5 Technical cooperation                  35 (5)
      1.5.6 Office for Cyber Affairs of the MFA    40 (1)
    1.6 A cybersecurity strategy in the making?    41 (12)
      1.6.1 Significance of the Internet for       45 (1)
      China
      1.6.2 Goals and objectives                   45 (1)
      1.6.3 Cyber threat landscape                 45 (3)
      1.6.4 Means for strategic goals              48 (5)
    1.7 Conclusion                                 53 (2)
Chapter 2 PLA Views On Informationized Warfare,    55 (26)
Information Warfare And Information Operations
          Dean Cheng
    2.1 The evolution of Chinese military          56 (3)
    thinking
    2.2 The growing importance of information      59 (5)
    2.3 Information operations                     64 (8)
      2.3.1 Command and control missions           65 (1)
      2.3.2 Offensive information missions         66 (4)
      2.3.3 Defensive information missions         70 (1)
      2.3.4 Information support and                71 (1)
      safeguarding missions
    2.4 Key types of information operations        72 (7)
      2.4.1 Electronic combat                      72 (1)
      2.4.2 Network combat                         73 (1)
      2.4.3 Psychological combat                   74 (1)
      2.4.4 Intelligence combat                    75 (1)
      2.4.5 Command and control combat             76 (2)
      2.4.6 Physical combat                        78 (1)
    2.5 Computer network warfare and               79 (2)
    information operations
Chapter 3 China's Adaptive Internet Management     81 (20)
Strategy After The Emergence Of Social Networks
          Alice Exman
    3.1 Weibo: the turning point                   82 (7)
      3.1.1 Adaptive behaviors                     82 (5)
      3.1.2 Participative behaviors                87 (2)
    3.2 Latest adjustments under Xi Jinping        89 (10)
      3.2.1 Smart management of the Internet: a    89 (7)
      top priority under the new leadership
      3.2.2 "Guiding public opinion"               96 (1)
      3.2.3 while seizing economic opportunities   97 (2)
    3.3 Bibliography                               99 (2)
Chapter 4 India's Cybersecurity - The Landscape    101(28)
          Cherian Samuel
    4.1 A snapshot of Asian cyberspace             102(12)
      4.1.1 Aspects of cyberconflict in Asia       106(1)
      4.1.2 West Asia                              106(4)
      4.1.3 East Asia                              110(4)
    4.2 The Indian cyber landscape                 114(3)
    4.3 The China challenge: a case study          117(4)
    4.4 Responses                                  121(2)
      4.4.1 Implementing a national                121(2)
      cybersecurity policy
    4.5 Creating an institutional framework        123(3)
      4.5.1 Ensuring supply chain integrity        124(2)
    4.6 Takeaways                                  126(3)
Chapter 5 China And Southeast Asia: Offline        129(28)
Information Penetration And Suspicions Of
Online Hacking - Strategic Implications From A
Singaporean Perspective
          Alan Chong
    5.1 Offline sphere: latent "diasporic"         133(16)
    information power and official Chinese soft
    power
    5.2 The online sphere: hacktivism as mostly    149(3)
    projections
    5.3 Conclusion: offline politics               152(1)
    strategically obscure online projections
    5.4 Bibliography                               153(4)
Chapter 6 Impact Of Mongolia's Choices In          157(20)
International Politics On Cybersecurity
          Daniel Ventre
    6.1 Mongolia's cyberspace                      158(2)
    6.2 Cyberspace and political stakes            160(8)
      6.2.1 Mongolia targeted by cyber-attacks     160(7)
      6.2.2 Nationalism on the Internet            167(1)
    6.3 Information-space security policy          168(9)
Chapter 7 China-Iran-Russia - A Cybercommunity     177(22)
Of Information?
          Thomas Flichy De La Neuville
    7.1 The hall marks of cyber-cooperation        178(3)
      7.1.1 Pax cyber-mongolica                    178(1)
      7.1.2 A cyber-community of information -     179(1)
      the proof of Syria
      7.1.3 The counter-point of Mali              180(1)
    7.2 The geopolitical bases for the             181(13)
    cyber-mongol empire
      7.2.1 An undeniable closer Sino-Iranian      182(2)
      relationship
      7.2.2 Arms sales in Russo-Iranian and        184(2)
      Sino-Iranian relations
      7.2.3 Sino-Russian support for Iranian       186(1)
      civil nuclear development
      7.2.4 A clear-cut Sino-Russian diplomatic    187(3)
      position on the Iranian program
      7.2.5 Oil and gas at the heart of            190(4)
      economic relations
    7.3 Order in cyberspace: an absolute           194(9)
    necessity within China
      7.3.1 Interior order and exterior disorder   194(2)
      7.3.2 The appearance of peace and the        196(3)
      necessity of secrecy
Chapter 8 Discourse Regarding China: Cyberspace    199(84)
And Cybersecurity
          Daniel Ventre
    8.1 Identification of prevailing themes        203(44)
      8.1.1 Depictions of the Internet in China    203(4)
      8.1.2 Impact of cyberspace on Chinese        207(7)
      society
      8.1.3 The Chinese cyber threat               214(9)
      8.1.4 The Chinese army: its practices,       223(5)
      capabilities and strategies
      8.1.5 Espionage                              228(12)
      8.1.6 China, cyberspace and international    240(4)
      relations
      8.1.7 Particular points from the Western     244(3)
      perspective
    8.2 The evolution of American discourse        247(30)
    about China, cybersecurity and cyber defense
      8.2.1 The annual reports of the US           248(15)
      Defense Department
      8.2.2 Speeches of the Secretaries of         263(9)
      Defense
      8.2.3 Prospective analyses conducted by      272(5)
      the National Intelligence Council
    8.3 Conclusion                                 277(6)
General Conclusion                                 283(12)
List Of Authors                                    295(2)
Index                                              297

关闭


版权所有:西安交通大学图书馆      设计与制作:西安交通大学数据与信息中心  
地址:陕西省西安市碑林区咸宁西路28号     邮编710049

推荐使用IE9以上浏览器、谷歌、搜狗、360浏览器;推荐分辨率1360*768以上