Skip to main content

2018 | Buch

Cybersecurity in China

The Next Wave

insite
SUCHEN

Über dieses Buch

This book offers the first benchmarking study of China’s response to the problems of security in cyber space. There are several useful descriptive books on cyber security policy in China published between 2010 and 2016. As a result, we know quite well the system for managing cyber security in China, and the history of policy responses. What we don’t know so well, and where this book is useful, is how capable China has become in this domain relative to the rest of the world. This book is a health check, a report card, on China’s cyber security system in the face of escalating threats from criminal gangs and hostile states. The book also offers an assessment of the effectiveness of China’s efforts. It lays out the major gaps and shortcomings in China’s cyber security policy. It is the first book to base itself around an assessment of China’s cyber industrial complex, concluding that China does not yet have one. As Xi Jinping said in July 2016, the country’s core technologies are dominated by foreigners.

Inhaltsverzeichnis

Frontmatter
Chapter 1. The Cybersecurity Ecosystem
Abstract
China conducts more cyber espionage on itself than any other country does. The ecosystem for security in cyberspace is distorted by the country’s political system. The chapter lays out China’s definition of the problem set, and describes key features of the 2016 National Cyber Security Strategy. It then gives some background on the national policy shift in 2014 represented by Xi’s declaration of the ambition for China to become a cyber power.
Greg Austin
Chapter 2. Education in Cyber Security
Abstract
This chapter sketches the terrain of China’s university-level education in the cybersecurity sector. The chapter also looks briefly at the impact of an internationally mobile work force on China’s talent development.
Greg Austin
Chapter 3. Chinese Views of the Cyber Industrial Complex
Abstract
This chapter outlines the government’s view of national policy for S&T and industrial development in the field of cybersecurity. It draws on a roadmap for S&T development developed in 2011 by the Chinese Academy of Sciences. It documents vigorous leadership engagement in these issues beginning in 2016, and their policy imperative of indigenization. It discussed the emergence of the private sector in cybersecurity relative to the better established state-owned sector.
Greg Austin
Chapter 4. Corporate Cybersecurity
Abstract
This chapter looks at trends in how well prepared Chinese corporations are to defend themselves in cyberspace at home. It looks in broad terms at the question of security culture in enterprises, and at the special case of the financial services sector, especially banks. This sector was the main initial focus of government policy for informatization at the turn of the century (Austin in Cyber policy in China. Polity, Cambridge, 2014: 94). Other sectors of note in this chapter include airlines, the electricity grid and universities, though these are discussed only in brief.
Greg Austin
Chapter 5. Cyber Insecurity of Chinese Citizens
Abstract
The chapter restates the well known fact that China’s government demands a near absolute right to monitor online activity of its citizens. It is introduced by results of a 2017 report on citizen security in cyberspace by major cities in China. It is then organized around four themes: defenses against cyber crime; the cybersecurity confidence of the citizens; protection of political privacy, including in connection with advanced artificial intelligence; and other personal privacy, especially in the light of the emerging social credit system.
Greg Austin
Chapter 6. Governmental Cybersecurity
Abstract
This chapter looks at how well prepared the Chinese government is to defend its various cyber assets. These range across internal security, leadership security, national defence, and protection of critical information infrastructure. There are competing tensions between the different strands of policy. Moreover, everything that seems largely domestic has an inescapable international dimension, and vice versa.
Greg Austin
Chapter 7. Grading National Cybersecurity
Abstract
There are many useful approaches to evaluating different aspects of a country’s ability to provide for its security in cyberspace. Some focus on more technical aspects, while others include broader social and political issues. This chapter documents several assessments of the state of cybersecurity in China, looking first at Chinese assessments and then at international points of view. The chapter concludes with a discussion of China’s performance against the nine strategic tasks identified by the December 2016 Cybersecurity Strategy and canvassed in Chap. 1.
Greg Austin
Chapter 8. The Next Wave
Abstract
The short conclusion highlights key findings of the book, emphasizing the need to look beyond a monochromatic characterization of national cybersecurity to one based on diverse mission sets and stakeholder sets. It comments on the balance between technology, society and international political economy in shaping the future of cybersecurity in China.
Greg Austin
Metadaten
Titel
Cybersecurity in China
verfasst von
Prof. Greg Austin
Copyright-Jahr
2018
Electronic ISBN
978-3-319-68436-9
Print ISBN
978-3-319-68435-2
DOI
https://doi.org/10.1007/978-3-319-68436-9

Premium Partner