Advertisement

Governmental Cybersecurity

  • Greg Austin
Chapter
Part of the SpringerBriefs in Cybersecurity book series (BRIEFSCYBER)

Abstract

This chapter looks at how well prepared the Chinese government is to defend its various cyber assets. These range across internal security, leadership security, national defence, and protection of critical information infrastructure. There are competing tensions between the different strands of policy. Moreover, everything that seems largely domestic has an inescapable international dimension, and vice versa.

Keywords

CCP City statistics Critical infrastructure Public security intelligence Internet terror Tibet Xinjiang Cyber police agencies Information leaks 

References

  1. Austin G (2014) Terabyte leaks and political legitimacy in the U.S. and China. The Globalist, 24 Jan 2014. https://www.theglobalist.com/terabyte-leaks-political-legitimacy-u-s-china/
  2. Austin G, Cappon E, McConnell B, Kostyuk N (2014) A measure of restraint in cyberspace: reducing risk to civilian nuclear assets. EastWest Institute, New York. https://www.eastwest.ngo/sites/default/files/A%20Measure%20of%20Restraint%20in%20Cyberspace.pdf
  3. Bandurski D (2010) Internet terrors. China Media Project, 29 Oct 2010. http://chinamediaproject.org/2010/10/29/internet-terrors/
  4. BSA (2015) China. Asia-Pacific cybersecurity dashboard. The Software Alliance. http://cybersecurity.bsa.org/2015/apac/assets/PDFs/country_reports/cs_china.pdf
  5. CAC (2017) Critical information infrastructure security protection regulations, Cyberspace administration of China. China copyright and media. (trans: Webster G, Triolo P, Creemers R). Updated 2 July 2017. https://chinacopyrightandmedia.wordpress.com/2017/07/10/critical-information-infrastructure-security-protection-regulations/
  6. Cai C (2015) Cybersecurity in Chinese context: changing concepts, vital interests and cooperative willingness. China Q Int Strateg Stud 1(3): 471–496 (October 2015)Google Scholar
  7. Cao S (2017) China to mobilize net users for cyber security. Global Times, 13 Sept 2017. http://www.globaltimes.cn/content/1066130.shtml
  8. China Daily (2017) Nation rolls out emergency cybersecurity plan, 29 June 2017. http://usa.chinadaily.com.cn/epaper/2017-06/29/content_29932460.htm
  9. China News (2017) Critical information infrastructure level protection seminar held. 360 situational awareness achievements recognized. http://www.chinanews.com/it/2017/04-26/8209552.shtml
  10. CNCERT/CC (2016) A summary of China’s internet security situation in 2015. National Computer Network Emergency Technology Processing Coordination Center, April 2016. In Chinese http://www.cac.gov.cn/files/pdf/wlaq/Annual%20Report/CNCERT2015.pdf
  11. CUAA (2016) Public security technology rankings list of China’s universities in 2016. http://www.cuaa.net/cur/zhuanti/news.jsp?information_id=130796 (In Chinese)
  12. Fan X, Fan K, Wang Y, Zhou R (2015) Overview of cyber-security of industrial control system. In: 2015 international conference on cyber security of smart cities, industrial control system and communications (SSIC). 1–7http://toc.proceedings.com/27630webtoc.pdf
  13. Garside J, Pegg D (2016) Panama papers reveal offshore secrets of China’s red nobility. The Guardian, 6 April 2016. https://www.theguardian.com/news/2016/apr/06/panama-papers-reveal-offshore-secrets-china-red-nobility-big-business
  14. Gertz B (2014) Chinese police university trains Beijing hackers. Free Beacon, 20 March 2014. http://freebeacon.com/national-security/chinese-police-university-trains-beijing-hackers/
  15. Huang S (2016) Research on the problems and countermeasures of public security information application. J Hubei Police Acad (2):71–75 (In Chinese)Google Scholar
  16. ICIJ (2014) Leaked records reveal offshore holdings of China’s elite. The Panama Papers, International Commission of Investigative Journalists. https://www.icij.org/investigations/offshore/leaked-records-reveal-offshore-holdings-of-chinas-elite/#
  17. Jia X, Wang J (2016) Discussion on the reform of public security information security personnel training mode based on the teaching of network attack and defense. Information and Computers 9:231–233 In ChineseGoogle Scholar
  18. Jiang X (2016) Research and application of public security continuing education in information security. J Wuhan Public Secur Cadres Coll 30(1) (In Chinese)Google Scholar
  19. Leng J, Zhu B (2015) Professional practice model reforming of information security specialty in public security college. In: International conference on mechatronics, electronic, industrial and control engineering (MEIC 2015). Atlantis Press, pp. 71–74Google Scholar
  20. Li H (2017) Discussion on public security computer network and information security. In: Network security technology and application magazine. 2017(8) In Chinese. http://www.xueshu.com/wlaqjsyyy/201708/29810655.html
  21. Luo Y (2011) Study on the current situation of information security and counter measures in China. Energy Procedia 5: 392–396. https://www.sciencedirect.com/science/article/pii/S1876610211010034CrossRefGoogle Scholar
  22. Luo J, Yang M, Ling Z (2016) Network space security system and key technologies. Sci China: Inf Sci 46(8):939–968 (In Chinese)Google Scholar
  23. Ma D, Zheng L (2009) Research into the status quo of learning strategies of college students and blended learning strategy. In: Hybrid Learning and education, pp. 175–185 (In Chinese)CrossRefGoogle Scholar
  24. Mandiant (2013) APT1: exposing one of China’s cyber espionage units. https://www.fireeye.com/content/dam/fireeye-www/services/pdfs/mandiant-apt1-report.pdf
  25. Mattis P (2012) The Analytic Challenge of Understanding Chinese Intelligence Services. In” Studies in Intelligence. 56(3):47–57. https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol.-56-no.-3/pdfs/Mattis-Understanding%20Chinese%20Intel.pdf
  26. MoE (2017) 2014. Undergraduate record or approval results of ordinary colleges and universities, 25 Feb 2017. http://www.jwz86.com/en/index.php?m=content&c=index&a=show&catid=6&id=34
  27. NSFocus (2017) An analysis of exposed IoT technologies in China. NSFocus technologies. http://blog.nsfocusglobal.com/wp-content/uploads/2017/05/ExposedIoT-AssetsChinaMarch-2017.pdf
  28. Peng Z (2017a) On public security intelligence collection based on big data. In: Research on library science, pp. 33–48. http://en.cnki.com.cn/Article_en/CJFDTOTAL-TSSS201709007.htm (In Chinese)
  29. Peng Z (2017b) On the research paradigm of public security intelligence science under big data environment. Libr Inf 1:82–86. http://en.cnki.com.cn/Article_en/CJFDTOTAL-BOOK201701011.htm (In Chinese)
  30. Peng Z (2017c) On the study object of public security intelligence science. J Intel 36(4):12–17. http://en.cnki.com.cn/Article_en/CJFDTOTAL-QBZZ201704003.htm (In Chinese)
  31. USITO (2017) CAAC drafted new security measures in line with CSL, 20 Feb 2017. http://www.usito.org/news/caac-drafted-new-secuirty-measures-line-csl
  32. United States v. Wang Dong et al United States District Court, Western District of Pennsylvania, filed 1 May 2014 under seal, Criminal No. 14–118. http://www.justice.gov/iso/opa/resources/5122014519132358461949.pdf
  33. United States (2015) District Court Western District of Pennsylvania. United States of America v. Wang Dong et al. Grand Jury Indictment. 1 May 2014. https://www.documentcloud.org/documents/3214423-2014-05-01-USA-v-Wang-Dong-Et-Al-Indictment.html
  34. USCC (2016) China’s intelligence services and espionage operations hearing before the U.S.-China economic and security review commission, 9 June 2016. https://www.uscc.gov/sites/default/files/transcripts/June%2009%2C%202016%20Hearing%20Transcript.pdf
  35. Wang H (2017) 1116 cyber-security police units have been set up nationwide. Beijing: Guangming 14 Feb 2017. http://epaper.gmw.cn/gmrb/html/2017-02/14/nw.D110000gmrb_20170214_2-04.htm (In Chinese)
  36. Wong KC (1994) Public security reform in China in the 1990s. In: Brosseau M, Lo CK (eds) China annual review 1994. Chinese University Press, Hong Kong, pp. 5.1–5.33Google Scholar
  37. XJTU (2012) China’s protection for critical information infrastructure. Blue paper. Xian Jiaotong University Information Security Law Research Centrehttp://www.infseclaw.net/news/html/817.html
  38. Yang Z (2017) China’s public security intelligence: progress, challenges, and prospects. Georgetown J Asian Aff. https://asianstudies.georgetown.edu/sites/asianstudies/files/documents/gjaa_3.2_yang.pdf (Spring 2017)
  39. Yu Y, Hu W (2013) Intrusion detection algorithm design in the public security system for network monitoring. Bull Sci Technol 29(6):185–190 (In Chinese)Google Scholar
  40. Zeng X (2010) Research on management of internet by police in west of China. Netw Secur Technol Appl 4:18–20 (In Chinese)Google Scholar
  41. Zeng Z, Yang K, Zhang Y and Zhou P (2013) Increasing Employees' Awareness and Enhancing Motivation in E-Government Security Behavior Management. In: 2013 Fourth International Conference on Digital Manufacturing & Automation. 684–687Google Scholar
  42. Zhang H, Han W, Lai X, Lin D, Ma J, Li J (2015) Survey on cyberspace security. Sci China Inf Sci 58(11):1–43 (In Chinese)MathSciNetGoogle Scholar
  43. Zhang L (2015) The paradigm change of public security intelligence studies from the perspective of “big data.” J Intell 34(7):9–28. http://en.cnki.com.cn/Article_en/CJFDTOTAL-QBZZ201507003.htm (In Chinese)
  44. Zheng A, Song P, Han B, Zheng M (2013) Reflection of the nation cybersecurity’s evolution. In: Applied Mechanics and Materials, pp. 347–350 (In Chinese)CrossRefGoogle Scholar

Copyright information

© The Author(s) 2018

Authors and Affiliations

  1. 1.Australian Centre for Cyber SecurityUniversity of New South WalesCanberraAustralia

Personalised recommendations