Question

In: Economics

in a short essay, describe chinas cyber security and the technology used.

in a short essay, describe chinas cyber security and the technology used.

Solutions

Expert Solution

China's academic discussion of cyber warfare began in the 1990s when it was called "information warfare." Impressed by how the U.S. military benefited from the use of high-tech technology in the Gulf War and subsequent operations in Kosovo, Afghanistan, and Iraq China began to realize that there was no way to adequately defend itself without changing the forms of war in which it was conducted. China takes a few steps about cyberspace and its own national security. The first is that in a vacuum, China has not developed its cyber capabilities. Rather, as a response to the evolving cyber warfare strategies and practices of other countries, especially those of the US and Russia, they have developed them. The second is that the views of the Chinese government on cyber warfare are aligned with its military strategy, which is changed depending on the context of national security, domestic situation, and foreign military activities.

Another essential objective is the defense of critical information infrastructure, in common with all states. In all areas, including security, China is increasingly dependent on knowledge networks. While it has a large-scale technology industry and in some it has the ability to compete with the US, most of its core network infrastructure and main software and hardware are supplied by U.S. companies. Apple, Cisco, Google, IBM, Intel, Microsoft, Oracle, and Qualcomm are the biggest Internet companies in its domestic supply chain.

Heavy reliance on the products of these companies makes it necessary to work towards the growth of the domestic technology industry and its capabilities, making the internal internet infrastructure of the country more stable. It also indicates that China's primary mission in cyberspace is to maintain sensitive areas ' information security, which is primarily defensive and non-destructive. Many have accused the Chinese government and military of cyberattacks in which intellectual property was stolen, including the U.S. government. There are several distinctions to be made clear in this respect.


Related Solutions

Discuss Cyber Security as it relates to the role of the US government. Discuss Cyber Security as it relates to the responsibilities of the individuals who are involved in creating the technology.
(a) – Discuss Cyber Security as it relates to the role of the US government. (b)– Discuss Cyber Security as it relates to the responsibilities of the individuals who are involved in creating the technology.  
Describe each of the 5 main types of cyber security: 1) Critical infrastructure security: 2) Application...
Describe each of the 5 main types of cyber security: 1) Critical infrastructure security: 2) Application security: 3) Network Security: 4) Cloud security: 5) Internet of things security
Prompt: You will submit your creation of a cyber-security policy. The cyber-security policy will assess how...
Prompt: You will submit your creation of a cyber-security policy. The cyber-security policy will assess how the organization will interpret security issues that occur in the workplace. The cyber-security policy will also distinguish and examine ethical issues in the workplace that pertain to social media, email, and privacy. Compose an organizational security policy that protects the confidentiality , integrity , and availability of EQUIFAX DATA BREACH IN 2017 Original Question : Prompt: You will submit your creation of a cyber-security...
a) Examine the three elements of Cyber Security that are generally used to protect computer networks and systems.
a) Examine the three elements of Cyber Security that are generally used to protect computer networks and systems.  b) An ethical dilemma is a situation a person faces in which a decision must be made about appropriate behavior. Discuss any five key professional ethical values to be considered when faced with ethical dilemma at the work place. c) Jeremy Bentham (1748-1832) once said “The greatest goal is to achieve the greatest happiness for as many people as possible.” Clearly explain what he...
Cyber security is an essential tool for managing risks in today’s increasingly dynamic and capable cyber...
Cyber security is an essential tool for managing risks in today’s increasingly dynamic and capable cyber threat landscape. Yet the market for cyber security remains small, and organizations are making only tactical investments in cyber security measures—one of the reasons why there has been an increase in cyber-attacks. Evidence suggests that this trend will last for some time to come. However, the anticipation of an increasingly open and mobile enterprise should help refocus the spotlight on strategic investments in areas...
(cyber security ) What is the difference between Cyber Espionage and Nation State Hacking? Explain the...
(cyber security ) What is the difference between Cyber Espionage and Nation State Hacking? Explain the differences with the help of appropriate examples. Please provide your own words. No copy from the internet. 150 to 200 words.
Cyber security Security Policy: , write a small antivirus policy for the IT infrastructure and users...
Cyber security Security Policy: , write a small antivirus policy for the IT infrastructure and users in a small business an elementary school You may research anti-virus policies of organizations on the web, please use and cite responsibly. Security Recommendation: Rose Shumba manages the IT security for a school. Given the wide range of people who use the school’s computers, it is challenging for Rose to prevent virus infections. She has installed an anti-virus on each machine and has a...
Write a short essay about the very integral of miniaturization in information Technology highlighting the advantages...
Write a short essay about the very integral of miniaturization in information Technology highlighting the advantages and disadvantages, if any that the concept has brought along into the domain of information technology. you may include issues of speed, affordability and access to other technological innovations occasioned by miniaturization.
Compare and contrast cyber security policy of Victorian and NSW governments
Compare and contrast cyber security policy of Victorian and NSW governments
Security Technology Inc. (STI) is a manufacturer of an electronic control system used in the manufacture...
Security Technology Inc. (STI) is a manufacturer of an electronic control system used in the manufacture of certain special-duty auto transmissions used primarily for police and military applications. The part sells for $55 per unit and has sales of 24,000 units in the current yeard, 2018. STI has no inventory on hand at the beginning of 2018 and is projecting sales of 26,000 units in 2019. STI is planning the same production level for 2019 as in 2018, 25000 units...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT