Abstract
This chapter looks at how well prepared the Chinese government is to defend its various cyber assets. These range across internal security, leadership security, national defence, and protection of critical information infrastructure. There are competing tensions between the different strands of policy. Moreover, everything that seems largely domestic has an inescapable international dimension, and vice versa.
Keywords
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Austin G (2014) Terabyte leaks and political legitimacy in the U.S. and China. The Globalist, 24 Jan 2014. https://www.theglobalist.com/terabyte-leaks-political-legitimacy-u-s-china/
Austin G, Cappon E, McConnell B, Kostyuk N (2014) A measure of restraint in cyberspace: reducing risk to civilian nuclear assets. EastWest Institute, New York. https://www.eastwest.ngo/sites/default/files/A%20Measure%20of%20Restraint%20in%20Cyberspace.pdf
Bandurski D (2010) Internet terrors. China Media Project, 29 Oct 2010. http://chinamediaproject.org/2010/10/29/internet-terrors/
BSA (2015) China. Asia-Pacific cybersecurity dashboard. The Software Alliance. http://cybersecurity.bsa.org/2015/apac/assets/PDFs/country_reports/cs_china.pdf
CAC (2017) Critical information infrastructure security protection regulations, Cyberspace administration of China. China copyright and media. (trans: Webster G, Triolo P, Creemers R). Updated 2 July 2017. https://chinacopyrightandmedia.wordpress.com/2017/07/10/critical-information-infrastructure-security-protection-regulations/
Cai C (2015) Cybersecurity in Chinese context: changing concepts, vital interests and cooperative willingness. China Q Int Strateg Stud 1(3): 471–496 (October 2015)
Cao S (2017) China to mobilize net users for cyber security. Global Times, 13 Sept 2017. http://www.globaltimes.cn/content/1066130.shtml
Ceprei Laboratory (2017) Big data city network security index report. 360 cyber security center. http://zt.360.cn/dl.php?filename=%E5%A4%A7%E6%95%B0%E6%8D%AE%E5%9F%8E%E5%B8%82%E7%BD%91%E7%BB%9C%E5%AE%89%E5%85%A8%E6%8C%87%E6%95%B0%E6%8A%A5%E5%91%8A.pdf
China Daily (2017) Nation rolls out emergency cybersecurity plan, 29 June 2017. http://usa.chinadaily.com.cn/epaper/2017-06/29/content_29932460.htm
China News (2017) Critical information infrastructure level protection seminar held. 360 situational awareness achievements recognized. http://www.chinanews.com/it/2017/04-26/8209552.shtml
CNCERT/CC (2016) A summary of China’s internet security situation in 2015. National Computer Network Emergency Technology Processing Coordination Center, April 2016. In Chinese http://www.cac.gov.cn/files/pdf/wlaq/Annual%20Report/CNCERT2015.pdf
CUAA (2016) Public security technology rankings list of China’s universities in 2016. http://www.cuaa.net/cur/zhuanti/news.jsp?information_id=130796 (In Chinese)
Fan X, Fan K, Wang Y, Zhou R (2015) Overview of cyber-security of industrial control system. In: 2015 international conference on cyber security of smart cities, industrial control system and communications (SSIC). 1–7http://toc.proceedings.com/27630webtoc.pdf
Garside J, Pegg D (2016) Panama papers reveal offshore secrets of China’s red nobility. The Guardian, 6 April 2016. https://www.theguardian.com/news/2016/apr/06/panama-papers-reveal-offshore-secrets-china-red-nobility-big-business
Gertz B (2014) Chinese police university trains Beijing hackers. Free Beacon, 20 March 2014. http://freebeacon.com/national-security/chinese-police-university-trains-beijing-hackers/
Huang S (2016) Research on the problems and countermeasures of public security information application. J Hubei Police Acad (2):71–75 (In Chinese)
ICIJ (2014) Leaked records reveal offshore holdings of China’s elite. The Panama Papers, International Commission of Investigative Journalists. https://www.icij.org/investigations/offshore/leaked-records-reveal-offshore-holdings-of-chinas-elite/#
Jia X, Wang J (2016) Discussion on the reform of public security information security personnel training mode based on the teaching of network attack and defense. Information and Computers 9:231–233 In Chinese
Jiang X (2016) Research and application of public security continuing education in information security. J Wuhan Public Secur Cadres Coll 30(1) (In Chinese)
Leng J, Zhu B (2015) Professional practice model reforming of information security specialty in public security college. In: International conference on mechatronics, electronic, industrial and control engineering (MEIC 2015). Atlantis Press, pp. 71–74
Li H (2017) Discussion on public security computer network and information security. In: Network security technology and application magazine. 2017(8) In Chinese. http://www.xueshu.com/wlaqjsyyy/201708/29810655.html
Luo Y (2011) Study on the current situation of information security and counter measures in China. Energy Procedia 5: 392–396. https://www.sciencedirect.com/science/article/pii/S1876610211010034
Luo J, Yang M, Ling Z (2016) Network space security system and key technologies. Sci China: Inf Sci 46(8):939–968 (In Chinese)
Ma D, Zheng L (2009) Research into the status quo of learning strategies of college students and blended learning strategy. In: Hybrid Learning and education, pp. 175–185 (In Chinese)
Mandiant (2013) APT1: exposing one of China’s cyber espionage units. https://www.fireeye.com/content/dam/fireeye-www/services/pdfs/mandiant-apt1-report.pdf
Mattis P (2012) The Analytic Challenge of Understanding Chinese Intelligence Services. In” Studies in Intelligence. 56(3):47–57. https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol.-56-no.-3/pdfs/Mattis-Understanding%20Chinese%20Intel.pdf
MoE (2017) 2014. Undergraduate record or approval results of ordinary colleges and universities, 25 Feb 2017. http://www.jwz86.com/en/index.php?m=content&c=index&a=show&catid=6&id=34
NSFocus (2017) An analysis of exposed IoT technologies in China. NSFocus technologies. http://blog.nsfocusglobal.com/wp-content/uploads/2017/05/ExposedIoT-AssetsChinaMarch-2017.pdf
Peng Z (2017a) On public security intelligence collection based on big data. In: Research on library science, pp. 33–48. http://en.cnki.com.cn/Article_en/CJFDTOTAL-TSSS201709007.htm (In Chinese)
Peng Z (2017b) On the research paradigm of public security intelligence science under big data environment. Libr Inf 1:82–86. http://en.cnki.com.cn/Article_en/CJFDTOTAL-BOOK201701011.htm (In Chinese)
Peng Z (2017c) On the study object of public security intelligence science. J Intel 36(4):12–17. http://en.cnki.com.cn/Article_en/CJFDTOTAL-QBZZ201704003.htm (In Chinese)
USITO (2017) CAAC drafted new security measures in line with CSL, 20 Feb 2017. http://www.usito.org/news/caac-drafted-new-secuirty-measures-line-csl
United States v. Wang Dong et al United States District Court, Western District of Pennsylvania, filed 1 May 2014 under seal, Criminal No. 14–118. http://www.justice.gov/iso/opa/resources/5122014519132358461949.pdf
United States (2015) District Court Western District of Pennsylvania. United States of America v. Wang Dong et al. Grand Jury Indictment. 1 May 2014. https://www.documentcloud.org/documents/3214423-2014-05-01-USA-v-Wang-Dong-Et-Al-Indictment.html
USCC (2016) China’s intelligence services and espionage operations hearing before the U.S.-China economic and security review commission, 9 June 2016. https://www.uscc.gov/sites/default/files/transcripts/June%2009%2C%202016%20Hearing%20Transcript.pdf
Wang H (2017) 1116 cyber-security police units have been set up nationwide. Beijing: Guangming 14 Feb 2017. http://epaper.gmw.cn/gmrb/html/2017-02/14/nw.D110000gmrb_20170214_2-04.htm (In Chinese)
Wong KC (1994) Public security reform in China in the 1990s. In: Brosseau M, Lo CK (eds) China annual review 1994. Chinese University Press, Hong Kong, pp. 5.1–5.33
XJTU (2012) China’s protection for critical information infrastructure. Blue paper. Xian Jiaotong University Information Security Law Research Centrehttp://www.infseclaw.net/news/html/817.html
Yang Z (2017) China’s public security intelligence: progress, challenges, and prospects. Georgetown J Asian Aff. https://asianstudies.georgetown.edu/sites/asianstudies/files/documents/gjaa_3.2_yang.pdf (Spring 2017)
Yu Y, Hu W (2013) Intrusion detection algorithm design in the public security system for network monitoring. Bull Sci Technol 29(6):185–190 (In Chinese)
Zeng X (2010) Research on management of internet by police in west of China. Netw Secur Technol Appl 4:18–20 (In Chinese)
Zeng Z, Yang K, Zhang Y and Zhou P (2013) Increasing Employees' Awareness and Enhancing Motivation in E-Government Security Behavior Management. In: 2013 Fourth International Conference on Digital Manufacturing & Automation. 684–687
Zhang H, Han W, Lai X, Lin D, Ma J, Li J (2015) Survey on cyberspace security. Sci China Inf Sci 58(11):1–43 (In Chinese)
Zhang L (2015) The paradigm change of public security intelligence studies from the perspective of “big data.” J Intell 34(7):9–28. http://en.cnki.com.cn/Article_en/CJFDTOTAL-QBZZ201507003.htm (In Chinese)
Zheng A, Song P, Han B, Zheng M (2013) Reflection of the nation cybersecurity’s evolution. In: Applied Mechanics and Materials, pp. 347–350 (In Chinese)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2018 The Author(s)
About this chapter
Cite this chapter
Austin, G. (2018). Governmental Cybersecurity. In: Cybersecurity in China. SpringerBriefs in Cybersecurity. Springer, Cham. https://doi.org/10.1007/978-3-319-68436-9_6
Download citation
DOI: https://doi.org/10.1007/978-3-319-68436-9_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-68435-2
Online ISBN: 978-3-319-68436-9
eBook Packages: Computer ScienceComputer Science (R0)