Advertisement

Grading National Cybersecurity

  • Greg Austin
Chapter
Part of the SpringerBriefs in Cybersecurity book series (BRIEFSCYBER)

Abstract

There are many useful approaches to evaluating different aspects of a country’s ability to provide for its security in cyberspace. Some focus on more technical aspects, while others include broader social and political issues. This chapter documents several assessments of the state of cybersecurity in China, looking first at Chinese assessments and then at international points of view. The chapter concludes with a discussion of China’s performance against the nine strategic tasks identified by the December 2016 Cybersecurity Strategy and canvassed in Chap.  1.

Keywords

Metrics Cyber security index Social factors ITU China ranking 

References

  1. Austin G, Slay J (2016) Australia’s response to advanced technology threats: an agenda for the next government. UNSW Canberra, Canberra, Australian Centre for Cyber Security Discussion Paper#3Google Scholar
  2. CNCERT/CC (2016) A summary of China’s internet security situation in 2015. National Computer Network Emergency Technology Processing Coordination Center, April 2016. http://www.cac.gov.cn/files/pdf/wlaq/Annual%20Report/CNCERT2015.pdf (In Chinese)
  3. CNCERT/CC (2017) A summary of China’s internet security situation in 2016. National Computer Network Emergency Technology Processing Coordination Center, April 2017. http://www.cac.gov.cn/wxb_pdf/CNCERT2017/2016situation.pdf (In Chinese)
  4. CNNIC (2002a) 9th statistical survey of the development of the internet in China. China Internet Network Information Center, January. http://www.cnnic.net.cn/download/manual/en-reports/9.pdf
  5. CNNIC (2002b) 10th statistical survey of the development of the internet in China. China Internet Network Information Center, July. http://www.cnnic.net.cn/download/manual/en-reports/10.pdf
  6. CNNIC (2005) 16th statistical survey report on the internet development in China. China Internet Network Information Center, July (URL no longer available)Google Scholar
  7. Feihua News (2017) Experts expose ransomware’s true face. What measures did relevant departments in our country take? 15 May 2017. https://news.fh21.com.cn/rdsj/4912207_6.html (In Chinese)
  8. He W (2015) Shares in Chinese online travel agent Ctrip plunge after hack attack stops service. South China Morning Post, 28 May 2015. http://www.scmp.com/tech/enterprises/article/1811165/chinas-largest-online-travel-agent-ctrip-taken-offline-hackers
  9. Hui Z, Tan Q (2016) Cyberspace security in the era of data economy: global and Chinese contexts. In: Hui Z, Tan Q (eds) Annual report on development of cyberspace security in China. Social Sciences Academy Press, Blue Book, Beijing (In Chinese). 1–16Google Scholar
  10. ITU (2007) ITU Global Cybersecurity Agenda (GCA) High-Level Experts Group (HLEG). Report of the Chairman to HLEG. International Telecommunication Union, Geneva, Switzerland. https://www.itu.int/en/action/cybersecurity/Documents/gca-chairman-report.pdf
  11. ITU (2014) Global 2014 results. International Telecommunication Union. Geneva, Switzerland. https://www.itu.int/en/ITU-D/Cybersecurity/Documents/GCI_Global_2014_results.pdf
  12. ITU (2015) Global cybersecurity index and wellness profiles. International telecommunication Union, Geneva, Switzerland. https://www.itu.int/dms_pub/itu-d/opb/str/D-STR-SECU-2015-PDF-E.pdf
  13. ITU (2017) Global cybersecurity index 2017. International telecommunication Union, Geneva, Switzerland, 19 July 2017. https://www.itu.int/dms_pub/itu-d/opb/str/D-STR-GCI.01-2017-R1-PDF-E.pdf
  14. Marro N (2016) The five levels of cyber security in China. China Business Review, 5 Dec 2016. http://www.chinabusinessreview.com/the-5-levels-of-information-security-in-china/
  15. McAfee (2014) Net losses: estimating the global cost of cybercrime. Economic impact of cybercrime II. Cent for Strateg Int Stud. https://www.mcafee.com/de/resources/reports/rp-economic-impact-cybercrime2.pdf
  16. PWC (2016) PwC global economic crime survey 2016—mainland China, Hong Kong and Macau Supplement. https://www.pwccn.com/en/migration/pdf/forensic-economic-crime-survey-2016.pdf
  17. Qihoo 360 (2017a) 2016 China internet security report, 12 Feb 2017. http://zt.360.cn/1101061855.php?dtid=1101062514&did=490278985 (In Chinese)
  18. Qihoo 360 (2017b) Research on internet fraud trends for 2016, 13 Jan 2017. https://e70efc.lt.yunpan.cn/lk/cWHqQF5BHYVZF (In Chinese)
  19. Qu W (2010) China’s path to informatization, English ed. Cengage Learning AsiaGoogle Scholar
  20. Reuters (2016) Hackers attack 20 million accounts on Alibaba’s Taobao shopping site, 4 Feb 2016. http://www.reuters.com/article/us-alibaba-cyber-idUSKCN0VD14X
  21. Symantec (2017) Internet security threat report, vol 22. https://www.symantec.com/content/dam/symantec/docs/reports/istr-22-2017-en.pdf
  22. www.gov.cn (2007) Ministry of public security and others issued notice on “information security level protection management approach”, 24 July 2007. http://www.gov.cn/gzdt/2007-07/24/content_694380.htm (In Chinese)
  23. Xi Jinping (2016) Speech at the work conference for cybersecurity and informatization, Posted on 19 April 2016, updated on 26 April 2016. https://chinacopyrightandmedia.wordpress.com/2016/04/19/speech-at-the-work-conference-for-cybersecurity-and-informatization/

Copyright information

© The Author(s) 2018

Authors and Affiliations

  1. 1.Australian Centre for Cyber SecurityUniversity of New South WalesCanberraAustralia

Personalised recommendations