The Cybersecurity Ecosystem

  • Greg AustinEmail author
Part of the SpringerBriefs in Cybersecurity book series (BRIEFSCYBER)


China conducts more cyber espionage on itself than any other country does. The ecosystem for security in cyberspace is distorted by the country’s political system. The chapter lays out China’s definition of the problem set, and describes key features of the 2016 National Cyber Security Strategy. It then gives some background on the national policy shift in 2014 represented by Xi’s declaration of the ambition for China to become a cyber power.


Definition National strategy Military power National security Authoritarianism Censorship Sovereignty Communist party Cyber power Great firewall Great wall Public security Organizational structure Legislation Standards 


  1. Alasabah N (2016) Information control 2.0: the cyberspace administration of China tames the internet. In: Merics China Monitor, 15 Sept 2016.
  2. APCERT (2017) APCERT annual report 2016. In: Asia Pacific Computer Emergency Response Team.
  3. AsiaOne (2017) Nexusguard Places in Top 25 on Cybersecurity 500 List for Eight Quarters in a Row, 21 Feb 2017.
  4. Asia Society (2013) Complete Transcript: Thomas Donilon at Asia Society New York, 11 March 2013.
  5. Austin G (2014) Cyber policy in China. Polity, CambridgeGoogle Scholar
  6. Austin G (2015) China’s Cyberespionage: The National Security Distinction and U.S. Diplomacy. In: The diplomat, May 2015.
  7. Bing C (2017) Former U.S. spies say anti-virus software makes for a perfect espionage platform. In: Cyberscoop, 13 Oct 2017.
  8. Branigan T (2013) China’s new premier, Li Keqiang, vows to tackle bureaucracy and corruption. In: The guardian, 17 March 2013.
  9. CAC (2016) China’s National Cybersecurity Strategy, issued by the Cyberspace Administration of China. In Chinese. 27 Dec 2016. Original at
  10. Chen B (2016) WIN10 misses government procurement. Joint venture will be difficult. In: 21st century business Herald. In Chinese. 16 Aug 2016.
  11. Chen S (2013) Great fire wall architect Fang Binxing quits as president of Beijing university. South China Morning Post.
  12. (2017) Xi calls for global vision in China’s national security work, 18 Feb 2017.
  13. China Daily (2017a) Open image in new window [wǎngyou xiāojìn]: Online game curfew. In English, 07 Feb 2017.
  14. China Daily (2017b) China to introduce review commission on cybersecurity, 07 Feb 2017.
  15. China Digital Times (2017) China reinforces great firewall With new VPN rules, 23 Jan 2017.
  16. Clapper J (2013) Remarks as delivered by James R. Clapper, Director of national intelligence, worldwide threat assessment to the house permanent select committee on intelligence, Washington DC, 11 April 2013,
  17. Feng D (2014) Preface. China Science Bulletin. 59:4161–4162CrossRefGoogle Scholar
  18. Feng S (2017) What is Obama’s military legacy. In:, 17 Jan 2017. The people’s liberation army daily (trans),
  19. Hathaway M, Klimburg A (2012) Preliminary considerations on national cybersecurity. In: Klimburg A (ed) National cybersecurity manual. NATO CCDCOE, Tallin, pp. 1–43Google Scholar
  20. Inkster N (2015) The Chinese intelligence agencies. In: Lindsay J, Cheung TM, Deveron DS (eds) China and cybersecurity: espionage, strategy, and politics in the digital revolution. Oxford University Press, pp. 29–50CrossRefGoogle Scholar
  21. Li J (2015) Network information security challenges and relevant strategic thinking as highlighted by “PRISM”. In: Huang Z, Sun X, Luo J, Wang J (eds) Cloud computing and security. Lecture notes in computer science, vol 9483.Springer, Heidelberg, pp. 147–156CrossRefGoogle Scholar
  22. Li X (2015) Regulation of cyber space: An analysis of Chinese law on cyber crime. Int J Cyber Criminol 9(2): 185–204 (July–December)Google Scholar
  23. Marro N (2016) The five levels of cybersecurity in China. China Business Review. 5 December 2016.
  24. Mi Y (2017) Public’s leaked personal information seized in online safety campaign. In: China daily, 5 Jan 2017,
  25. Microsoft (2016) China invites Microsoft to join technical committee 260 (TC260) to draft cybersecurity rules. 26 Aug 2016,
  26. Moriuchi P, Ladd B (2017) China’s ministry of state security likely influences national network vulnerability publications. In: Recorded future blog, 16 Nov 2017,
  27. SAC (2016) Standards administration of China national information security standardization technical committee general assembly held in Beijing, 15 Jan 2016,
  28. Shih G (2015) Huawei CEO questions China’s cybersecurity policies. In: Christian Science Monitor, 22 April 2015,
  29. State Council (1994) Regulations for safety protection of computer information systems. Decree No. 147, 18 Feb 1994. Available at AsianLII,
  30. State Council (2015) Full text: China’s military strategy, China daily, 26 May 2015,
  31. USITO (2016) TC260 new committee opened to foreign participation.
  32. Waldron A (1983) The problem of the great wall of China. Harv J Asiatic Stud 43(2):643–663CrossRefGoogle Scholar
  33. White House (2013) Readout of the president’s phone call with Chinese president Xi Jinping, 14 March 2013.
  34. Xi J (2015) Remarks by H.E., Xi Jinping president of the people’s republic of China at the opening ceremony of the second world internet conference, Wuzhen, 16 Dec 2015.
  35. Xi J (2016) Speech at the national meeting on cyber security and informatization. In Chinese. 25 Apr 2016.
  36. Xinhua (2014) Xi Jinping leads internet security group, 27 Feb 2014.
  37. Xinhua (2017a) Thousands of illegal apps taken offline in south China, 24 Jan 2017.
  38. Xinhua (2017b) Procuratorates approve arrest of 19,000 telecom fraud suspects, 14 Jan 2017.
  39. Xinhua (2016) China’s first national NPO in cybersecurity founded, 25 March 2016.
  40. Zhang S (2016) China sets goals of informatization, CRI news. 28 July 2016.
  41. Zuo M (2016) China aims to become internet superpower by 2050, South China morning post, 28 July 2016.

Copyright information

© The Author(s) 2018

Authors and Affiliations

  1. 1.Australian Centre for Cyber SecurityUniversity of New South WalesCanberraAustralia

Personalised recommendations