<tt id="6hsgl"><pre id="6hsgl"><pre id="6hsgl"></pre></pre></tt>
          <nav id="6hsgl"><th id="6hsgl"></th></nav>
          国产免费网站看v片元遮挡,一亚洲一区二区中文字幕,波多野结衣一区二区免费视频,天天色综网,久久综合给合久久狠狠狠,男人的天堂av一二三区,午夜福利看片在线观看,亚洲中文字幕在线无码一区二区
          Global EditionASIA 中文雙語Fran?ais
          Opinion
          Home / Opinion / Global Views

          Rules of virtual engagement

          China and the US should carry out sustained dialogue to reach a consensus on what is acceptable conduct in cyberspace

          By LU CHUANYING | China Daily Global | Updated: 2022-09-26 08:05
          Share
          Share - WeChat
          JIN DING/CHINA DAILY

          China and the US should carry out sustained dialogue to reach a consensus on what is acceptable conduct in cyberspace

          Recently, China's cyber security agencies and companies have disclosed information on public attribution of cyberattacks against network facilities in China by the United States. This has changed the two countries' previous stance on issues related to public attribution of cyber activities. In the past 10 years, it was the US government and businesses that frequently publicly accused China of alleged cyberattacks.

          The shift from being the accused to the accuser is a result of China attaching greater significance to the role of public attribution. The China-US competition in the field of public attribution will gradually turn into a long-term campaign and is likely to be a new friction point in the realm of cyber security. Therefore, strengthening crisis management is equally important for both sides. As a matter of fact, two problems exist when it comes to public attribution — how to establish widely supported norms that clearly define what types of cyber activities should be considered unacceptable, and how to reach a consensus on issues related to public attribution.

          First and foremost, the China-US disputes over public attribution derive from their vastly different perspectives on cyberattacks. The Chinese side thinks that any form of cyberattack is unacceptable, while the US thinks that since online intelligence-gathering activities are inevitable, what's important is to regulate such activities and reach a consensus.

          However, the lack of enforceable international laws or widely supported standards and norms that clearly define what types of cyber activities should be deemed illegitimate has made it fairly difficult to credibly question such activities. And the establishment of international norms faces multiple difficulties. Some countries have divergent views on key categories of cyber behavior and have different interpretations of even the handful of norms supported by the United Nations Group of Governmental Experts. Even if they did agree on behavioral standards, they would find it difficult to monitor and enforce them.

          From the US' point of view, since intelligence-gathering activities in the real world cannot be banned, cyber espionage should be allowed. The US has been resisting efforts to broadly prohibit certain types of cyber intrusions and potential attacks. Moreover, the dividing lines between cyber espionage and other offensive forms of cyber actions are so blurred that they are difficult to delineate and effectively cope with. Thus, the international community — including the US and China — still needs to clarify what types of cyber behavior should be deemed illegitimate or irresponsible.

          Second, countries can hardly reach a consensus on issues related to public attribution. This is because public attribution often fails to provide sufficient evidence, nor does it provide a legal basis for the accountability or responsibility. Also, there are major technical challenges in identifying who authorized the detected cyber operations, and also legal challenges in defining the circumstances in which a government should be held legally accountable for such actions.

          Therefore, China and the US should carry out sustained dialogue, strengthen dispute management, and roll out confidence-building measures.

          To start with, the two countries should reach a consensus on the fundamental principles of crisis management. In the face of more frequent conflicts in the cyber domain covering a wider range of fields, China and the US lack a basic consensus on crisis management. This reflects their deep-seated differences in their strategic intentions in cyberspace and cyber military security policies. The flawed bilateral communication mechanism hinders bilateral cooperation in cyberspace crisis management. China and the US should, on the diplomatic front, attach greater significance to meeting the basic requirements of cyber crisis management, including correctly understanding the other's interest demands in cyberspace and accurately assessing the other's cyber policy intentions.

          On top of that, China and the US should push forward the establishment of norms for regulating cyber conduct. Norms for responsible (or irresponsible) conduct could help reduce the risk of unintended effects on targeted networks and beyond, and minimize collateral damage and opportunities for cyber criminals to exploit tools, among other benefits.

          Last but not least, as a confidence-building measure, China and the US should establish an international coordination mechanism to combat ransomware attacks. Ransomware is among the most serious cyber challenges that both countries are confronted with, therefore a good starting point for bilateral cooperation. Such cooperation will deliver concrete benefits at a relatively low cost, help build confidence between the two countries in the cyber domain, and encourage other countries to take stronger action against ransomware.

          The author is a professor and director of the Research Center for International Cyberspace Governance at the Shanghai Institutes for International Studies. The author contributed this article to China Watch, a think tank powered by China Daily.

          The views do not necessarily reflect those of China Daily.

          Contact the editor at editor@chinawatch.cn

          Most Viewed in 24 Hours
          Top
          BACK TO THE TOP
          English
          Copyright 1994 - . All rights reserved. The content (including but not limited to text, photo, multimedia information, etc) published in this site belongs to China Daily Information Co (CDIC). Without written authorization from CDIC, such content shall not be republished or used in any form. Note: Browsers with 1024*768 or higher resolution are suggested for this site.
          License for publishing multimedia online 0108263

          Registration Number: 130349
          FOLLOW US
          主站蜘蛛池模板: 午夜福利在线观看6080| 日韩丝袜亚洲国产欧美一区| 国产亚洲女人久久久精品| 亚洲av午夜成人片| 国产日韩欧美黄色片免费观看 | 欧美中文字幕无线码视频| 五月色丁香婷婷网蜜臀av| 亚洲av色精品一区二区| 亚洲AV成人无码久久精品四虎| 男人深夜影院无码观看| 无码人妻aⅴ一区二区三区蜜桃| 一个人看的www在线视频| 国模精品视频一区二区三区| 99久久激情国产精品| 国产成人片无码视频| 丰满爆乳一区二区三区| 亚洲精品成人网久久久久久| 中文字幕在线视频不卡一区二区| 国产精品成人午夜久久| 在线人妻无码一区二区| 人妻一本久道久久综合鬼色 | 377P欧洲日本亚洲大胆| 日本伊人色综合网| 国产午夜视频在线观看| 国产成人综合在线女婷五月99播放| 国精产品999国精产品视频| 国产精品一区二区久久精品| 亚洲精品成人片在线观看精品字幕 | 国产精品久久久一区二区三区| 中文字幕人妻丝袜美腿乱| 日日橹狠狠爱欧美视频| 亚洲情A成黄在线观看动漫尤物| 成人自拍短视频午夜福利| 国产亚洲精品国产福APP| 无码午夜剧场| 国产精品综合av一区二区 | 日韩中文字幕精品人妻| 在线成人国产天堂精品av| 国产午夜精品久久久久免费视| 91精品伊人久久大香线蕉| 99久久精品国产亚洲精品|