<tt id="6hsgl"><pre id="6hsgl"><pre id="6hsgl"></pre></pre></tt>
          <nav id="6hsgl"><th id="6hsgl"></th></nav>
          国产免费网站看v片元遮挡,一亚洲一区二区中文字幕,波多野结衣一区二区免费视频,天天色综网,久久综合给合久久狠狠狠,男人的天堂av一二三区,午夜福利看片在线观看,亚洲中文字幕在线无码一区二区
          US EUROPE AFRICA ASIA 中文
          Opinion / Op-Ed Contributors

          Call for cyber defense, global cooperation

          (China Daily) Updated: 2015-08-12 08:06

          Call for cyber defense, global cooperation

          A man uses his cell phone to read updates about former US spy agency contractor Edward Snowden answering users' questions on Twitter in this photo illustration, in Sarajevo, Jan 23, 2014. [Photo/Agencies]

          Following US media reports in late July that the Barack Obama administration plans to take revenge on China for "cyberattacks", Bloomberg reported on Friday that computers of American Airlines and Sabre, a US company which runs an air travel reservation system, might have been attacked by China-based hackers. On Monday NBC news reported that Chinese hackers have been accessing the private emails of top US national security and trade officials since April 2010.

          This has raised fear among people that tensions between China and the US may intensify, with some even saying a large-scale cyber warfare seems unavoidable, which, in turn, calls for the need to clarify the concept of cyber warfare. In general, people equate cyber warfare with "destroying enemy telecommunication devices" or "hacking enemy databases" as in a real physical war, which, in fact, is only a small part of it.

          Conflicts in cyberspace are not new, and cyber warfare can be defined as activities to gain advantage in public opinion or export ideologies through online channels, or activities to obtain intelligence and carry out surveillance to do so.

          The US is a master at both. It has been playing up the "China cyberthreat" theory even while conducting surveillance against its allies, including Germany and Japan - and WikiLeaks has exposed the dark side of the US by releasing classified documents.

          Cyber warfare is asymmetric, because even a single hacker can launch an attack against a state. "No absolute security" is a quote often used by cybersecurity experts. This asymmetry is also a threat to the existing world order, because weaker states or organizations can harm the interests of regional and even global powers, and vice-versa. The difficulty in locating the attacker is the main reason behind this asymmetry.

          To fully secure itself, the US has been developing a shield against the invisible spear of cyberattack. It has already listed web-tracking as a priority research area and making progress. For example, it was reported that the US traced the source of the attack on Sony to the Democratic People's Republic of Korea because of the bugs in the DPRK's monitoring system. The US is also believed to have installed thousands of programs in China's computer networks that can alert the US against cyberattacks in advance.

          Another tactic to thwart attacks is to put potential attackers under pressure. The US' latest cyber strategy - of imposing economic sanctions, initiating judicial action and even launching military strikes against attackers - is designed to deter opponents from launching attacks. The New York Times has reported that Washington's "revenge" may also include attacks on key targets in China and stealing information from it.

          So, what can China do to establish an active rapid response system? The newly established central Internet security and information group, headed by top leader Xi Jinping, can mobilize enough resources and coordinate with relevant departments to deal with emergencies. The departments include public security agencies to analyze attacks, diplomatic organizations to deal with the problems diplomatically, and publicity departments to prevent rumors from creating chaos in the public.

          Like the US, China also needs to develop its cyber defense technology in order to deter potential attackers, with online tracking technology being a key part of the process so that the location (and perhaps identity) of the attacker can be known. It should also unambiguously declare its cyberspace sovereignty through key strategic documents, which offer legal basis for China to defend its cyberspace.

          Moreover, China should more actively participate in global cooperation on cybersecurity, and strengthen dialogues and coordination with Russia, the US and the European Union. Also, drafting an international covenant against cyber warfare would be in the great interest of China and send the international community a clear signal about China's stance on cybersecurity, as well as its determination to defend itself against attacks.

          The author is a researcher in cybersecurity at CCID Think Tank, affiliated to the Ministry of Industry and Information Technology.

          Most Viewed Today's Top News
          ...
          主站蜘蛛池模板: 野花社区www视频日本| 亚洲人成网线在线播放VA| 成全免费高清观看在线剧情| 国产农村激情免费专区| 99欧美日本一区二区留学生| 日本熟日本熟妇在线视频| 日本区二区三区不卡视频| 狠狠综合久久av一区二| 国产免费人成网站在线播放 | 久久精品国产福利一区二区| 国产午夜成人精品视频app| 日本久久精品一区二区三区| 欧美精品在线观看视频| 久久精品人妻无码一区二区三区| 久久天堂综合亚洲伊人HD妓女| 亚洲国产精品一区第二页| 亚洲一区成人在线视频| 两个人在线观看的www高清免费| 在线观看精品日本一区二| 老鸭窝在线视频| 久久一级精品久熟女人妻| 亚洲精品无码你懂的网站| 国产日韩av免费无码一区二区三区| 97无码人妻福利免费公开在线视频| 国产一区二区在线观看我不卡| 精品国产迷系列在线观看| 91精品少妇一区二区三区蜜桃臀 | 亚洲成人av在线系列| A男人的天堂久久A毛片| 国产明星精品无码AV换脸| 我趁老师睡觉摸她奶脱她内裤| 亚洲一区二区三区自拍偷拍| 麻豆精品在线| 亚洲午夜理论无码电影| 人妻无码vs中文字幕久久av爆 | 免费人成再在线观看视频| 精品国产亚洲区久久露脸| 91超碰在线精品| 亚洲aⅴ无码专区在线观看q| 一级片免费网站| 亚洲国产精品一区二区第一页|