US EUROPE AFRICA ASIA 中文
    Opinion / Op-Ed Contributors

    China needs foolproof cyber defense system

    By Wang Chuang (chinadaily.com.cn) Updated: 2015-08-11 13:35

    China needs foolproof cyber defense system

    Sr Airman Jose Rivera, infrastructure technician US Air Force, works at the 561st Network Operations Squadron (NOS) at Petersen Air Force Base in Colorado Springs, Colorado July 20, 2015. The 561st NOS executes defensive cyber operations in response to U.S. Cyber Command orders and intelligence based threats. [Photo/Agencies]

    Following US media reports in late July that the Barack Obama administration plans to take revenge on China for “cyberattacks”, Bloomberg reported on Friday that computers of American Airlines and Sabre, a US company which runs an air travel reservation system, might have been attacked by China-based hackers. On Monday NBC news reported that Chinese hackers have been accessing the private emails of top US national security and trade officials since April 2010.

    This has raised fear among people that tensions between China and the US may intensify, with some even saying a large-scale cyber warfare seems unavoidable, which, in turn, calls for the need to clarify the concept of cyber warfare. In general, people equate cyber warfare with “destroying enemy telecommunication devices” or “hacking enemy databases” as in a real physical war, which, in fact, is only a small part of it.

    Conflicts in cyberspace are not new, and cyber warfare can be defined as activities to gain advantage in public opinion or export ideologies through online channels, or activities to obtain intelligence and carry out surveillance to do so.

    The US is a master in both. It has been playing up the “China cyberthreat” theory even while conducting surveillance against its allies, including Germany and Japan — and WikiLeaks has exposed the dark side of the US by releasing classified documents.

    Cyber warfare is asymmetric, because even a single hacker can launch an attack against a state. “No absolute security” is a quote often used by cybersecurity experts. This asymmetry is also a threat to the existing world order, because weaker states or organizations can harm the interests of regional and even global powers, and vice-versa. The difficulty in locating the attacker is the main reason behind this asymmetry.

    To fully secure itself, the US has been developing a shield against the invisible spear of cyberattack. It has already listed web-tracking as a priority research area and making progress. For example, it was reported that the US traced the source of the attack on Sony thanks to the Democratic People’s Republic of Korea because of the bugs in the DPRK’s monitoring system. The US is also believed to have installed thousands of programs in China’s computer networks that can alert it against cyberattacks in advance.

    Another tactic to thwart attacks is to put potential attackers under pressure. The US’ latest cyber strategy — of imposing economic sanctions, initiating judicial action and even launching military strikes against attackers — is designed to deter opponents from launching attacks. The New York Times has reported that Washington’s “revenge” may also include attacks on key targets in China and stealing information from it.

    So, what China can do to establish an active rapid response system? The newly established central Internet security and information group, headed by top leader Xi Jinping, can mobilize enough resources and coordinate with relevant departments to deal with emergencies. But the departments should include public security agencies to analyze attacks, diplomatic organizations to deal with the problems diplomatically, and publicity departments to prevent rumors from creating chaos in the public.

    Like the US, China also needs to develop its cyber defense technology in order to deter potential attackers, with online tracking technology being a key part of the process so that the location (and perhaps identity) of the attacker can be known. It should also unambiguously declare its cyberspace sovereignty through key strategic documents, which offer legal basis for China to defend its cyberspace.

    Moreover, China should more actively participate in global cooperation on cybersecurity, and strengthen dialogues and coordination with Russia, the US and the European Union. Also, drafting an international covenant against cyber warfare would be in the great interest of China and send the international community a clear signal about China’s stance on cybersecurity, as well as its determination to defend itself against attacks.

    The author is a researcher in cybersecurity at CCID Think Tank, affiliated to the Ministry of Industry and Information Technology.

    Most Viewed Today's Top News
    ...
    八戒理论片午影院无码爱恋| 国产AV无码专区亚洲精品 | 中文字幕日韩欧美一区二区三区| 中出人妻中文字幕无码| 日韩乱码人妻无码系列中文字幕| 人妻系列无码专区无码中出| 日韩精品一区二三区中文 | 中文午夜乱理片无码| 精品欧洲AV无码一区二区男男| 国产麻豆天美果冻无码视频| 日韩人妻无码中文字幕视频| 中文成人无码精品久久久不卡| 久久精品aⅴ无码中文字字幕重口| 无码人妻丰满熟妇区96| 日韩欧美一区二区不卡中文| 天码av无码一区二区三区四区| 国产乱人无码伦av在线a| 亚洲AV无码久久精品蜜桃| 视频一区二区中文字幕| 欧美日韩中文字幕2020| 最新中文字幕AV无码不卡| 人妻少妇无码视频在线| 无码国内精品久久人妻麻豆按摩| 国产av无码专区亚洲av桃花庵| 久久无码人妻一区二区三区午夜| 亚洲日韩国产二区无码| 日韩精品无码人成视频手机 | 免费A级毛片无码A∨中文字幕下载| 午夜无码中文字幕在线播放| 91精品日韩人妻无码久久不卡| 国产a级理论片无码老男人| 国产AV无码专区亚洲精品| A∨变态另类天堂无码专区| 黄A无码片内射无码视频| 丰满熟妇人妻Av无码区| 亚洲欧美精品一区久久中文字幕 | 无码精品日韩中文字幕| 欧美日韩中文国产一区发布| 久久人妻AV中文字幕| 久久精品亚洲中文字幕无码麻豆| 亚洲日韩中文无码久久|