<tt id="6hsgl"><pre id="6hsgl"><pre id="6hsgl"></pre></pre></tt>
          <nav id="6hsgl"><th id="6hsgl"></th></nav>
          国产免费网站看v片元遮挡,一亚洲一区二区中文字幕,波多野结衣一区二区免费视频,天天色综网,久久综合给合久久狠狠狠,男人的天堂av一二三区,午夜福利看片在线观看,亚洲中文字幕在线无码一区二区
          Global EditionASIA 中文雙語Fran?ais
          Opinion
          Home / Opinion / Op-Ed Contributors

          Mutual trust urged to deal with challenges in cyberspace

          China Daily | Updated: 2019-06-03 07:48
          Share
          Share - WeChat

          Remarks by Senior Captain Xu Manshu, professor at National Defense University of People's Liberation Army

          The rapid development and comprehensive application of information and communication technology have created and enlarged the cyberspace, which, while promoting social efficiency and economic prosperity, poses new challenges on national and international security.

          First, an arms race centered on cybertechnology has unfolded. Boosting cybertechnology has been applied in the military field rapidly and acted as a force multiplier when coupled with conventional capabilities. Cybercapabilities reinforce the strength to offend. Some countries have possessed the cybercapabilities powerful enough to undermine the reliability of the critical infrastructure and military information networks of others. What's more, traditional military powers tend to regard the strategic emerging technologies, which are mainly based on cybertechnology, as game changers, and hence strive to enlarge technological generation gap with their strategic competitors. In some degree, the arms race in the cyberspace manifests itself, first and foremost, in technological competition. Emerging technologies have become the focus of strategic competition among major powers.

          Second, the development of cybercapabilities complicates the conflicts among states. In recent years, state-to-state cyberspace confrontations increased along with the intensified geopolitical conflicts. The scandal of Cambridge Analytica once again revealed that social media has turned into an effective tool to manipulate public opinion. There is no doubt that the cyberinfluence over human behavior has been applied by the countries as an important way to use information resources, thus putting all governments on vigilance with strengthened protection. From the technical perspective, on one hand, connectivity and anonymity of the internet have led to more covert confrontations among the countries. On the other hand, technological development has furthered the decentralization of cyberspace. Even countries with the most advanced technologies are unable to fully control the cyberspace. Abuse of offensive cybercapabilities brings in nothing but strategic risks, including kinetic retaliations and conflict escalation. No technology should be the excuse for war, nor should it be the trigger for conflict deterioration. Therefore, it is the responsibility of the defense authorities to maintain strategic restraint in the use of cybercapabilities and turn their eyes to defensive and resilient cybercapabilities.

          Third, the cyberspace calls for confidence-building measures. The more modernized a country is, the more dependent it will become on cyberspace. In the digital age, given the fast technological updates, increasing complexity and rising vulnerabilities of the cyberspace, no country could withstand state-level cyberattacks. Besides, cybercapabilities constantly present new risks to military security, nuclear security and space security. It is a shared aspiration of the international community to find a way to reduce destabilizing factors. In order to prevent conflicts and crisis in the cyberspace, joint efforts are required to resolve security dilemmas and enhance mutual trust. Despite unbalanced IT development and cyberspace capabilities, countries may consider, before further feasible approaches, putting in place a notification mechanism for regular exchanges on developing concerns and policies on cybersecurity and better understanding of the differences and common grounds in this respect. To be followed, more communication devices could be established at working levels incrementally, including telephone links, designated liaison officers, emails and more. Diversified communication channels are necessary for emergency response and coordination in crises and crucial for avoiding miscalculation.

          Fourth, precaution has to be taken against new risks arising from emerging technologies. Emerging technologies, such as big-data analysis, cloud computing, quantum technology and AI, have made breakthroughs in the past decades. More technological developments in these areas have soon been transferred into the military field. In future wars, unmanned and autonomous weaponry systems will certainly play a pivotal role. However, unmanned weapons may lower the threshold of war and lethal autonomous weapons could spell humanitarian disasters. Therefore, it is imperative for the defense authorities to keep an eye on the new risks rising from technology application while pursuing military superiority through applying emerging technologies, and prevent humanitarian disasters caused by proliferation and malicious use of cybertechnology. Risk assessment and mitigation measures shall be taken into consideration while designing and testing weaponry systems as well as deploying new technologies. The development and application of emerging technologies in defense field should always reflect the best of humanity. Invention and innovation of the cyberspace are fruits of human wisdom. It is the responsibility of the defense authorities to ensure that the emerging cybertechnologies continue to benefit the human race and promote international security, rather than create a frontier for another Cold War.

          Most Viewed in 24 Hours
          Top
          BACK TO THE TOP
          English
          Copyright 1994 - . All rights reserved. The content (including but not limited to text, photo, multimedia information, etc) published in this site belongs to China Daily Information Co (CDIC). Without written authorization from CDIC, such content shall not be republished or used in any form. Note: Browsers with 1024*768 or higher resolution are suggested for this site.
          License for publishing multimedia online 0108263

          Registration Number: 130349
          FOLLOW US
          主站蜘蛛池模板: 免费视频爱爱太爽了| 国产18禁黄网站禁片免费视频| 欧美不卡无线在线一二三区观| 亚洲欧美日韩第一页| 福利视频在线播放| 国产av无码专区亚洲aⅴ| 国产亚洲欧美另类一区二区三区| 91久久国产热精品免费| 女同国产日韩精品在线| 亚洲av熟女天堂系列| 一本久道久久综合狠狠躁av | 亚洲一区av无码少妇电影玲奈| 国产成人精品永久免费视频| 中文字幕亚洲综合第一页| 四虎成人精品永久网站| 亚洲国产成人资源在线| 无码国模国产在线观看免费| 这里只有精品免费视频| 久久精品99久久久久久久久| 国产精品乱子伦xxxx| 国产在线观看网址不卡一区 | 在线观看国产成人av天堂| 亚洲av午夜福利大精品| 国产成人精品国内自产色| 国产精品成人一区二区三区| 亚洲人成网网址在线看| 国产亚洲av手机在线观看| 99久久久无码国产精品古装 | 免费人成视频在线观看网站| 国产亚洲精品一区在线播放| 亚洲色欲在线播放一区二区三区| 九九热久久这里全是精品| 国产亚洲av日韩精品熟女| 国产精品一区二区久久岳| 国产一区二区日韩在线| 久久无码中文字幕免费影院| 亚洲第一福利网站在线| 精品国产中文字幕第一页| 91精品国产91久久综合桃花| 亚洲中文字幕无码av永久| 中文字幕人妻中出制服诱惑|