透過您的圖書館登入
IP:13.58.39.23

摘要


During Chinese President Xi Jinping's visit to the US in 2015, the two major powers agreed not to hack each other's critical infrastructure during peacetime while reaching another consensus on jointly combating cybercrime and promoting "code of conduct" in cyberspace. The question is: how can the agreement be implemented, the code of conduct be reached, given the fact that the both powers compete each other. This paper aims to analyze the China cyber warfare, including their operation model and strategy. It begins by offering PLA's definition of cyber warfare, and followed, makes comparison cyber warfare with information warfare. Thirdly, it will discuss the content of cyber warfare and the common mode of cyber-attack from PLA's perspective, including elements of software and hardware. Finally, this paper tries to point out what change has been made of Cyber Force after PLA's reforms in January 2016.

參考文獻


“The Hacker Attacks Created a New Defense Industry in Taiwan.” CNA. February 12, 2016. Accessed July 8, 2018. http://www.cna.com.tw/news/aipl/201602120056-1.aspx.
“Xi Jinping Visit the United States and the West to Do Network Forum Show Power.” CNA NEWS. September 9, 2015. Accessed July 8, 2018. http://www.cna.com.tw/news/ait/201509090217-1.aspx.
Bin, Tian. “Xi Jinping Promoted Military Reform to Form Information Force.” Frontline (February 2016).
Bodmer, Sean, Max Kilger, Gregory Carpenter, and Jade Jones. Reverse Deception: Organized Cyber Theat Counter-Exploitation. NewYork: McGraw-Hill Education, 2014.
Bu, Ruiwei. “The Great Firewall of China.” 2015. http://campus.murraystate.edu/academic/faculty/wlyle/540/2013/Bu.pdf.

延伸閱讀