Cybersecurity in China

Cybersecurity in China

This book is a health check, a report card, on China’s cyber security system in the face of escalating threats from criminal gangs and hostile states. The book also offers an assessment of the effectiveness of China’s efforts.

Author: Greg Austin

Publisher: Springer

ISBN: 9783319684369

Category: Business & Economics

Page: 130

View: 911

This book offers the first benchmarking study of China’s response to the problems of security in cyber space. There are several useful descriptive books on cyber security policy in China published between 2010 and 2016. As a result, we know quite well the system for managing cyber security in China, and the history of policy responses. What we don’t know so well, and where this book is useful, is how capable China has become in this domain relative to the rest of the world. This book is a health check, a report card, on China’s cyber security system in the face of escalating threats from criminal gangs and hostile states. The book also offers an assessment of the effectiveness of China’s efforts. It lays out the major gaps and shortcomings in China’s cyber security policy. It is the first book to base itself around an assessment of China’s cyber industrial complex, concluding that China does not yet have one. As Xi Jinping said in July 2016, the country’s core technologies are dominated by foreigners.
Categories: Business & Economics

The Huawei and Snowden Questions

The Huawei and Snowden Questions

Preliminary This book is open access under a CC BY 4.0 license. This book answers two central questions: firstly, is it at all possible to verify electronic equipment procured from untrusted vendors?

Author: Olav Lysne

Publisher: Springer

ISBN: 9783319749501

Category: Computers

Page: 116

View: 777

This open access book answers two central questions: firstly, is it at all possible to verify electronic equipment procured from untrusted vendors? Secondly, can I build trust into my products in such a way that I support verification by untrusting customers? In separate chapters the book takes readers through the state of the art in fields of computer science that can shed light on these questions. In a concluding chapter it discusses realistic ways forward. In discussions on cyber security, there is a tacit assumption that the manufacturer of equipment will collaborate with the user of the equipment to stop third-party wrongdoers. The Snowden files and recent deliberations on the use of Chinese equipment in the critical infrastructures of western countries have changed this. The discourse in both cases revolves around what malevolent manufacturers can do to harm their own customers, and the importance of the matter is on par with questions of national security. This book is of great interest to ICT and security professionals who need a clear understanding of the two questions posed in the subtitle, and to decision-makers in industry, national bodies and nation states.
Categories: Computers

Das Schweizer Buch

Das Schweizer Buch

Author: Schweizerische Landesbibliothek

Publisher:

ISBN: UCSC:32106019237897

Category:

Page:

View: 191

Categories: