期刊文献+

网络攻防视角下的国家间网络冲突:一种动态分层分析框架 被引量:3

Inter-state Cyber Conflict in the Perspective of Cyber Offence-defense Theory:A Dynamic and Hierarchy Analytical Framework
下载PDF
导出
摘要 [目的/意义]科学分析国家面临的网络冲突类型样式和变化趋势,是完善国家网络空间发展规划与战略规划,切实维护国家网络安全的基本参考依据。[方法/过程]通过将国家网络分为以信息存储、处理和交互为目的的通用信息系统和对物质或能量进行操纵和运输为目的的专用控制系统,对国家间网络冲突领域进行细分。[结果/结论]以通用信息系统为目标的网络冲突存在某种程度上的非对称进攻优势,但是这种进攻优势会随时间出现周期性变化,尤其是在跨越网络空间边界时将发生质变,专用控制系统由于有限的信息化,网络防御仍占据优势。我国的网络空间战略应根据不同领域的独有特性而有所区分,在保证自身安全的前提下避免陷入网络军备竞赛之中。 [Purpose/Significance]Scientific analysis of the types and trends of inter-state cyber conflicts faced by the country is the basic reference for updating strategic development plan of cyberspace and effectively maintaining the national cyber security.[Method/Process]This paper divides cyberspace into two fields:general information system for the purpose of information storage,processing and interaction and custom-built control system for the manipulation and transportation of material or energy,which subdivides the field of inter-state cyber conflicts.[Result/Conclusion]The cyber attack aiming at general information system has asymmetric attack advantage to some degree,but the advantage of cyber attack will weaken with time,especially when it crosses the boundary of cyberspace.Custom-built control system is still in the defense advantage due to the limited informatization.Our cyberspace strategy should be differentiated according to characteristics of different fields and avoid falling into the cyber arms race on the premise of security.
作者 宋道青 葛腾飞 Song Daoqing;Ge Tengfei(International Studies College,National University of Defense Technology,Nanjing 210039)
出处 《情报杂志》 CSSCI 北大核心 2021年第2期116-122,共7页 Journal of Intelligence
基金 国家社会科学基金重大项目“海上丝绸之路地缘安全及其风险管控研究”(编号:18ZDA050)研究成果之一。
关键词 网络空间 网络安全 网络攻防 时间动态 信息系统网络冲突 跨域网络冲突 cyberspace cyber security cyber offence-defense dynamic time-dependence cyber conflict within information system cross-domain cyber conflict
  • 相关文献

参考文献5

二级参考文献126

  • 1[英]巴瑞·布赞 [丹麦]奥利·维夫 [丹麦]迪.怀尔德 朱宁译.《新安全论》[M].杭州:浙江人民出版社,2003年版.第159-189页. 被引量:22
  • 2[美]罗伯特·基欧汉,约瑟夫·奈著,门洪华译:《权力与相互依赖》,北京:北京大学出版社,2002年版,第257-318页 被引量:14
  • 3[美]温特.《国际政治的社会理论》,秦亚青译,上海:上海人民出版社2001年版. 被引量:2
  • 4“Internet World Stats”,http://www.internetworldstats.com/stats.htm. 被引量:1
  • 5Leon Panetta,“Remarks by Secretary Panetta on Cybersecurity to the Business Executives for National Security”,2012,http://www.defense.gov/transcripts/transcript.aspx?transcriptid=5136. 被引量:1
  • 6“U.S.Homeland Chief:Cyber 9/11 Could Happen‘Imminently’”,Reuters,January 24,2013,http://www.reuters.com/article/2013/01/24/us-usa-cyber-threat-idU SBRE90N1A320130124. 被引量:1
  • 7James Lewis,“Cybersecurity and Cyberwarfare:Assessment of National Doctrine and Organization”,in UNIDIR,The Cyber Index:International Security Trends and Realities,New York and Geneva,2013. 被引量:1
  • 8Lucas Kello,“The Meaning of the Cyber Revolution:Perils to Theory and Statecraft”,International Security,Vol.38,No.2,2013,pp.7-40. 被引量:1
  • 9Richard Clarke,“War from Cyberspace”,The National Interest,November/December 2009,pp.31-36. 被引量:1
  • 10Sean Lawson,“Beyond Cyber-Doom:Assessing the Limits of Hypothetical Scenarios in the Framing of Cyber-Threats”,Journal of Information Technology&Politics,Vol.10,No.1,2014,pp.86-103. 被引量:1

共引文献45

同被引文献22

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部