Reflection of the Nation Cybersecurity's Evolution

Article Preview

Abstract:

Cybersecurity, as stated in the 2010 National Security Strategy of America, threats represent one of the most serious national security, public safety, and economic challenges we face as a nation. This paper examines the cybersecurity situation that the nation faces. Based on this, the vulnerabilities present in information systems and systems supporting critical infrastructure to cyberattacks are discussed. The argument is presented that Chinas internet censorship techniques have improved that nations Cybersecurity, which could affect the outcome of a conflict in cyberspace. The key future features of the Cybersecurity in China are put forth at the end of the treatise. The author believes such analysis can credibly help the establishment of the national Cybersecurity strategy.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2553-2558

Citation:

Online since:

August 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] United States Government Accountability Office, Cybersecurity: Continued Attention Needed to Protect Our Nation's Critical Infrastructure, GAO-11-865T, Washington, D.C., July (2011).

Google Scholar

[2] United States Government Accountability Office, Cybersecurity: Threats Impacting the Nation, GAO-12-666T. Washington, D.C., April (2012).

Google Scholar

[3] Office of the President of the United States, Department of Defense Strategy for Operating in Cybersapce, D20110714, Washington, D.C., July (2011).

Google Scholar

[4] David A. Gale, Maj, USAF, Cybermad: Should the United States Adopt a Mutually Assured Destruction Policy for Cyberspace?, Maxwell Air Force Base, Alabama, April (2009).

DOI: 10.21236/ada539622

Google Scholar

[5] Barnes, Julian E, Cyber-attack on Defense Department Computers Raises Concerns., Los Angeles Times, Nov. (2008).

Google Scholar

[6] Department of Defense, FACT SHEET: Defense Industrial Base (DIB) Cybersecurity Activities, May (2012).

Google Scholar

[7] General Keith Alexander. House Armed Services Subcommittee, Cyberspace Operations Testimony., Washington D.C., Sept. (2010).

Google Scholar