Cover image for Iste : Chinese Cybersecurity and Cyberdefense.
Iste : Chinese Cybersecurity and Cyberdefense.
Title:
Iste : Chinese Cybersecurity and Cyberdefense.
Author:
Ventre, Daniel.
ISBN:
9781119009016
Personal Author:
Edition:
1st ed.
Physical Description:
1 online resource (321 pages)
Series:
ISTE
Contents:
Cover -- Title Page -- Copyright -- Contents -- Author Biographies -- Introduction -- Chapter 1: China's Internet Development and Cybersecurity - Policies and Practices -- 1.1. Introduction -- 1.2. Internet development in China: an overview -- 1.3. China's policies towards Internet development -- 1.3.1. From the very beginning of its development, China's Internet has been closely linked to the Chinese economy, and was programmed and integrated into its macro economic development blueprints -- 1.3.2. In addition to lending full policy support to Internet development, China also invests heavily in building Internet infrastructures -- 1.3.3. The Chinese government actively promotes the R&D of next-generation Internet (NGI) -- 1.3.4. China practices a policy of managing cyber affairs in line with law, adhering to the principles of scientific and effective administration in its Internet governance -- 1.4. Cyber legislation and Internet administration -- 1.4.1. Basic principles and practices of Internet administration in China -- 1.4.1.1. Laws and regulations on Internet administration -- 1.4.1.2. The leading role of the Chinese government in Internet administration -- 1.4.1.3. Industry self-regulation -- 1.4.1.4. Public supervision through special websites -- 1.4.2. Guaranteeing the free and secure flow of information in cyberspace -- 1.4.2.1. Guaranteeing Citizens' Freedom of Speech on the Internet -- 1.4.2.1.1. Constitutional guarantee -- 1.4.2.1.2. Public supervision via the Internet -- 1.4.2.1.3. CCDI website for public supervision -- 1.4.2.1.4. Protecting citizens' online privacy -- 1.4.2.1.5. Guaranteeing online safety for minors -- 1.4.2.2. Protecting Internet Security -- 1.5. Cybersecurity and diplomacy: an international perspective -- 1.5.1. Cyber policy dialogue and consultation -- 1.5.2. Regional cyber cooperation.

1.5.3. Track II cyber diplomacy -- 1.5.4. Legal cooperation in combating cybercrimes -- 1.5.5. Technical cooperation -- 1.5.5.1. CNCERT -- 1.5.5.2. CNNIC -- 1.5.5.3. ISC -- 1.5.6. Office for Cyber Affairs of the MFA -- 1.6. A cybersecurity strategy in the making? -- 1.6.1. Significance of the Internet for China -- 1.6.2. Goals and objectives -- 1.6.3. Cyber threat landscape -- 1.6.4. Means for strategic goals -- 1.7. Conclusion -- Chapter 2: PLA Views on Informationized Warfare, Information Warfare and Information Operations -- 2.1. The evolution of chinese military thinking -- 2.2. The growing importance of information -- 2.3. Information operations -- 2.3.1. Command and control missions -- 2.3.2. Offensive information missions -- 2.3.2.1. Information coercion/information deterrence -- 2.3.2.2. Information blockade -- 2.3.2.3. Information misdirection -- 2.3.2.4. Information contamination -- 2.3.2.5. Information paralysis -- 2.3.3. Defensive information missions -- 2.3.4. Information support and safeguarding missions -- 2.4. Key types of information operations -- 2.4.1. Electronic combat (dianzizhan -- 电子战) -- 2.4.2. Network combat (wangluozhan -- 网络战) -- 2.4.3. Psychological combat (xinlizhan -- 心理战) -- 2.4.4. Intelligence combat (qingbaozhan -- 情报战) -- 2.4.5. Command and control combat (zhihuikongzhizhan -- 指挥控制战) -- 2.4.6. Physical combat -- 2.5. Computer network warfare and information operations -- Chapter 3: China's Adaptive Internet Management Strategy after the Emergence of Social Networks -- 3.1. Weibo: the turning point -- 3.1.1. Adaptive behaviors -- 3.1.2. Participative behaviors -- 3.2. Latest adjustments under Xi Jinping -- 3.2.1. Smart management of the Internet: a top priority under the new leadership -- 3.2.2. "Guiding public opinion"… -- 3.2.3. …while seizing economic opportunities -- 3.3. Bibliography.

Chapter 4: India's Cybersecurity - The Landscape -- 4.1. A snapshot of Asian cyberspace -- 4.1.1. Aspects of cyberconflict in Asia -- 4.1.2. West Asia -- 4.1.3. East Asia -- 4.2. The Indian cyber landscape -- 4.3. The China challenge: a case study -- 4.4. Responses -- 4.4.1. Implementing a national cybersecurity policy -- 4.5. Creating an institutional framework -- 4.5.1. Ensuring supply chain integrity -- 4.6. Takeaways -- Chapter 5: China and Southeast Asia: Offline Information Penetration and Suspicions of Online Hacking - Strategic Implications from a Singaporean Perspective -- 5.1. Offline sphere: latent "diasporic" information power and official Chinese soft power -- 5.2. The online sphere: hacktivism as mostly projections -- 5.3. Conclusion: offline politics strategically obscure online projections -- 5.4. Bibliography -- Chapter 6: Impact of Mongolia's Choices in International Politics on Cybersecurity -- 6.1. Mongolia's cyberspace -- 6.2. Cyberspace and political stakes -- 6.2.1. Mongolia targeted by cyber-attacks -- 6.2.2. Nationalism on the Internet -- 6.3. Information-space security policy -- Chapter 7: China-Iran-Russia - A Cybercommunity of Information? -- 7.1. The hall marks of cyber-cooperation -- 7.1.1. Pax cyber-mongolica -- 7.1.2. A cyber-community of information - the proof of Syria -- 7.1.3. The counter-point of Mali -- 7.2. The geopolitical bases for the cyber-Mongol empire -- 7.2.1. An undeniable closer Sino-Iranian relationship -- 7.2.2. Arms sales in Russo-Iranian and Sino-Iranian relations -- 7.2.3. Sino-Russian support for Iranian civil nuclear development -- 7.2.4. A clear-cut Sino-Russian diplomatic position on the Iranian program -- 7.2.5. Oil and gas at the heart of economic relations -- 7.3. Order in cyberspace: an absolute necessity within China -- 7.3.1. Interior order and exterior disorder.

7.3.2. The appearance of peace and the necessity of secrecy -- Chapter 8: Discourse Regarding China: Cyberspace and Cybersecurity -- 8.1. Identification of prevailing themes -- 8.1.1. Depictions of the Internet in China -- 8.1.2. Impact of cyberspace on Chinese society -- 8.1.3. The Chinese cyber threat -- 8.1.4. The Chinese army: its practices, capabilities and strategies -- 8.1.5. Espionage -- 8.1.6. China, cyberspace and international relations -- 8.1.7. Particular points from the Western perspective -- 8.2. The evolution of American discourse about China, Cybersecurity and cyberdefense -- 8.2.1. The annual reports of the US Defense Department -- 8.2.2. Speeches of the Secretaries of Defense -- 8.2.3. Prospective analyses conducted by the National Intelligence Council -- 8.3. Conclusion -- General Conclusion -- List of Authors -- Index.
Abstract:
Cyberdefense has become, over the past five years, a major issue on the international scene. China, by the place it occupies, is the subject of attention: it is observed, criticized, and designated by many states as a major player in the global cyber-insecurity. The United States is building their cyberdefense strategy against what they call the "Chinese threat." It is therefore important to better understand today's challenges related to cyber dimension in regard of the rise of China.Contributions from international researchers provide cross perspectives on China, its strategies and policies for cybersecurity and cyberdefense. These issues have now gained major strategic dimension: Is Cyberspace changing the scene of international relations? How China does apprehend cybersecurity and cyberdefense? What are the issues, challenges? What is the role of China in the global cyberspace?.
Local Note:
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2017. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Electronic Access:
Click to View
Holds: Copies: