1.

Record Nr.

UNINA9910132157603321

Titolo

Chinese cybersecurity and defense / / edited by Daniel Ventre

Pubbl/distr/stampa

London, [England] ; ; Hoboken, New Jersey : , : ISTE : , : Wiley, , 2014

©2014

ISBN

1-119-00900-6

1-119-00901-4

Descrizione fisica

1 online resource (321 p.)

Collana

ISTE

Disciplina

005.8

Soggetti

Computer security

Internet - Security measures

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Includes index.

Nota di contenuto

Cover; Title Page; Copyright; Contents; Author Biographies; Introduction; Chapter 1: China's Internet Development and Cyber security - Policies and Practices; 1.1. Introduction; 1.2. Internet development in China: an overview; 1.3. China's policies towards Internet development; 1.3.1. From the very beginning of its development,China's Internet has been closely linked to the Chinese economy, and was programmed and integrated into its macro economic development blueprints

1.3.2. In addition to lending full policy support to Internet development, China also invests heavily in building Internet infrastructures 1.3.3. The Chinese government actively promotes the R&D of next-generation Internet (NGI); 1.3.4. China practices a policy of managing cyber affairs in line with law, adhering to the principles of scientific and effective administration in its Internet governance; 1.4. Cyber legislation and Internet administration; 1.4.1. Basic principles and practices of Internet administration in China; 1.4.1.1. Laws and regulations on Internet administration

1.4.1.2. The leading role of the Chinese government in Internet administration 1.4.1.3. Industry self-regulation; 1.4.1.4. Public supervision through special websites; 1.4.2. Guaranteeing the free and secure flow of information in cyberspace; 1.4.2.1. Guaranteeing



Citizens' Freedom of Speech on the Internet; 1.4.2.1.1. Constitutional guarantee; 1.4.2.1.2. Public supervision via the Internet; 1.4.2.1.3. CCDI website for public supervision; 1.4.2.1.4. Protecting citizens' online privacy; 1.4.2.1.5. Guaranteeing online safety for minors; 1.4.2.2. Protecting Internet Security

1.5. Cyber security and diplomacy: an international perspective 1.5.1. Cyber policy dialogue and consultation; 1.5.2. Regional cyber cooperation; 1.5.3. Track II cyber diplomacy; 1.5.4. Legal cooperation in combating cyber crimes; 1.5.5. Technical cooperation; 1.5.5.1. CNCERT; 1.5.5.2. CNNIC; 1.5.5.3. ISC; 1.5.6. Office for Cyber Affairs of the MFA; 1.6. A cyber security strategy in the making?; 1.6.1. Significance of the Internet for China; 1.6.2. Goals and objectives; 1.6.3. Cyber threat landscape; 1.6.4. Means for strategic goals; 1.7. Conclusion

Chapter 2: PLA Views on Informationized Warfare, Information Warfare and Information Operations 2.1. The evolution of Chinese military thinking; 2.2. The growing importance of information; 2.3. Information operations; 2.3.1. Command and control missions; 2.3.2. Offensive information missions; 2.3.2.1. Information coercion/information deterrence; 2.3.2.2. Information blockade; 2.3.2.3. Information misdirection; 2.3.2.4. Information contamination; 2.3.2.5. Information paralysis; 2.3.3. Defensive information missions; 2.3.4. Information support and safeguarding missions

2.4. Key types of information operations

Sommario/riassunto

Cyber defense has become, over the past five years, a major issue on the international scene. China, by the place it occupies, is the subject of attention: it is observed, criticized, and designated by many states as a major player in the global cyber-insecurity. The United States is building their cyber defense strategy against what they call the ""Chinese threat."" It is therefore important to better understand today''s challenges related to cyber dimension in regard of the rise of China.Contributions from international researchers provide cross perspectives on China, its strategies and policy