美国网络安全战略变化趋势及问题研究
详细信息    查看全文 | 推荐本文 |
  • 英文篇名:Research on the Trends of U.S. Cyber Security Strategy
  • 作者:石培培 ; 刘玉书
  • 英文作者:Shi Peipei;Liu Yushu;Institute of American Studies,CASS;Georgia Institute of Technology,the United States of America;
  • 关键词:网络安全 ; 网络空间 ; 网络病毒
  • 英文关键词:cyber security;;cyber space;;cyber virus
  • 中文刊名:ZLJC
  • 英文刊名:Journal of Strategy and Decision-Making
  • 机构:中国社会科学院美国研究所;
  • 出版日期:2018-01-10
  • 出版单位:战略决策研究
  • 年:2018
  • 期:v.9;No.48
  • 语种:中文;
  • 页:ZLJC201801001
  • 页数:23
  • CN:01
  • ISSN:44-1673/C
  • 分类号:5-26+107
摘要
美国方面认为未来十年的网络安全问题的首要挑战将来自中国和俄罗斯,并将视中国为主要对手。在攻击模式上开始由原来的"硬入侵"向"软入侵"转变。其中病毒工具的开发将上升到了战略武器的地位,并将进一步重视社交网络的网络价值。同时,美国在网络安全方面高度重视反介入/区域拒止(A2/AD)战略。在组织架构上,强化了网络安全相关部门联合作战的能力。同时,最近五年来美国在网络安全战略方面加强了亚太地区针对性监控,建立了网络安全问题联动机制。另一方面,美国在网络安全方面也存在自身基础设施运营和政府体制方面的问题,并需要加强对美国网络安全国际战略和公私合作模式相关方面的研究。
        According to the survey in the U.S.,it is found that the U.S.authority believes that China and Russia will become the main challenges in the situation of cybersecurity.And the U.S.will take China as the main competitor in the field of cybersecurity.It is also found that the U.S.cybersecurity strategies have changed immensely,from"hard attack"to"soft attack".The computer virus attacking tools have been employed as strategic weapons,and the social network is increasingly becoming important.Besides,the U.S.authorities pay much intention to the utilization of cyber A2/AD strategy,and display great efforts on the joint operation efficiency of multi-departments.Meanwhile,they have strengthened the cybersecurity cooperation in the Asia-Pacific region.But,the issue of public information infrastructure management and the limitation of government bureaucracy institutions have become obstacles to the U.S.cybersecurity.The further research will need to pay due attention to the U.S.international cybersecurity cooperation and the cooperation in public-private agencies.
引文
(1)Gus W.Weiss,Duping the Soviets,Jun.,2008.https://www.cia.gov/library/center-for-thestudy-of-intelligence/csi-publications/csi-studies/studies/96unclass/farewell.html(访问时间:2017年2月13日).
    (2)Charles Schmidt and Tom Darby,The What,Why,and How of the 1988 Internet Worm,Nov.,1988.https://snowplow.org/tom/worm/worm.htm(l访问时间:2017年1月22日).
    (3)Steven Hildreth,Cyberwarfare,CRS Report for Congress,Jun.,2001.https://fas.org/irp/crs/RL30735.pdf
    (4)Robert O′Harrow Jr.and Greg Linch,Timeline:Key events in cyber history,The Washington Post,Jun.,2012.http://www.washingtonpost.com/wp-srv/special/investigative/zeroday/cyber-historytimeline(/访问时间:2016年12月22日).
    (5)The National Strategy to Secure Cyberspace,Feb.,2003.https://www.us-cert.gov/sites/default/files/publications/cyberspace_strategy.pdf(访问时间:2017年4月22日).
    (6)Task Force on Cyber Deterrence,Department of Defense,Feb.,2017.http://www.acq.osd.mil/dsb/reports/2010s/DSB-Cyber Deterrence Report_02-28-17_Final.pdf(访问时间:2017年4月22日).
    (7)Defense Science Board.Task Force on Cyber Deterrence,Department of Defense.Feb,2017.http://www.acq.osd.mil/dsb/reports/2010s/DSB-Cyber Deterrence Report_02-28-17_Final.pdf(访问时间:2017年4月2日).
    (8)Defense Science Board,Task Force on Cyber Supply Chain,Nov.2016.https://www.hsdl.org/?abstract&did=799509.(访问时间:2017年6月22日).
    (9)The National Strategy to Secure Cyberspace,Feb.,2003.https://www.us-cert.gov/sites/default/files/publications/cyberspace_strategy.pdf(访问时间:2017年3月22日).
    (10)李恒阳:《美国网络军事战略探析》,载《国际政治研究》2015年第1期,第113~134页。
    (11)该报告于4月17日签署,4月23日发布。https://www.defense.gov/Portals/1/features/2015/0415_cyber-strategy/Final_2015_Do D_CYBER_STRATEGY_for_web.pdf(访问时间:2017年4月22日).
    (12)National Security Strategy,Feb.2015.http://nssarchive.us/wp-content/uploads/2015/02/2015.pdf(访问时间:2017年3月10日).
    (13)Office of the Secretary of Defense,Annual Report to Congress:Military and Security Developments Involving the Peoples Republic of China 2016.April,2016.http://www.defense.gov/Portals/1/Documents/pubs/2016%20China%20Military%20Power%20Report.pdf(访问时间:2017年2月22日).
    (14)M.Taylor Fravel.Chinas New Military Strategy:“Winning Informationized Local Wars。”China Brief.June 2015.http://www.jamestown.org/programs/chinabrief/single/?tx_ttnews%5Btt_news%5D=44072&c Hash=c403ff4a87712ec43d2a11cf576f3ec1#。V1BLDPkr K70(访问时间:2017年3月21日)。
    (15)同上注。
    (16)CSIS.Cyber disrupt 2017.Mar.2017.https://www.csis.org/events/cyber-disrupt-2017.(访问时间:2017年3月21日)。
    (17)Adam Segal,“Is China a Paper Tiger in Cyberspace?”Asia Unbound,Feb.2012.http://blogs.cfr.org/asia/2012/02/08/is-china-a-paper-tiger-in-cyberspace/(访问时间:2017年1月18日)。
    (18)Office of the Secretary of Defense.Annual Report to Congress:Military and Security Developments Involving the Peoples Republic of China 2016.Apr.2016.https://www.defense.gov/Portals/1/Documents/pubs/2016%20China%20Military%20Power%20Report.pdf(访问时间:2017年1月18日).
    (19)Libicki M.Pulling Punches in Cyberspace.In:Proceedings of a Workshop on Deterring Cyberattacks,2010.p.123-147.
    (20)Sanger,D.US Decides to Retaliate Against China's Hacking.New York Times,July 2015.http://www.nytimes.com/2015/08/01/world/asia/us-decides-to-retaliate-against-chinas-hacking.html(访问时间:2017年5月1日)。
    (21)Robert Mc Millan.Siemens:Stuxnet worm hit industrial systems.Computerworld.Sep。,2010.https://www.computerworld.com/article/2515570/network-security/siemens--stuxnet-worm-hit-industrial-systems.html(访问时间:2017年4月26日)。
    (22)Associated Press,Iran′s Nuclear Agency Trying to Stop Computer Worm.Independent.Sep.2010.http://www.independent.co.uk/news/world/middle-east/irans-nuclear-agency-trying-to-stop-computer-worm-2089447.html(访问时间:2017年4月11日)。
    (23)Gregg Keizer,Is Stuxnet the'best'malware ever?.Computerworld.Sep.,2010.https://www.computerworld.com/article/2515757/malware-vulnerabilities/is-stuxnet-the--best--malware-ever-.htm(l访问时间:2017年4月19日).
    (24)Symantec Security Response,Stuxnet 0.5:How It Evolved,Feb.2013.https://www.symantec.com/connect/blogs/stuxnet-05-how-it-evolved(访问时间:2017年4月13日).
    (25)CSIS.Cyber disrupt 2017.Mar.2017.https://www.csis.org/events/cyber-disrupt-2017(访问时间:2017年3月21日).
    (26)Segal A.US Offensive Cyber Operations in a China-US Military Confrontation.June 2016.https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2836203(访问时间:2017年3月19日).
    (27)South Africa:Food Used as Election Weapon,Say Monitors.Apr.2009.https://www.socialengineer.org/wiki/archives/Governments/Governments-Food Election Weapon.html(访问时间:2017年3月21日).
    (28)胡波,“美国人眼中的中国'反介入'威胁及其应对”,《中国海权策:外交、海洋经济及海上力量》,网址:http://blog.ifeng.com/article/33534490.htm(l访问时间:2017年4月22日).
    (29)General Michael Hayden discusses the Stuxnet Virus on 60 Minutes.https://www.youtube.com/watch?v=8HK3XPXBb Nk https://www.youtube.com/watch?v=0FEr0DFwvc Y(访问时间:2017年6月19日).
    (30)The Relationship of U.S.Army Cyber Command and Second Army.http://www.arcyber.army.mil/Pages/History.aspx(访问时间:2017年6月19日)。
    (31)2017年8月中旬,特朗普宣布将提升网军司令部的地位。但根据美国国防部相关网页的官方说明,以及作者本人直接致电美国网军司令部问询(美国网军司令部电话:402-294-4130),截至2017年10月12日,美国网军司令部依然是美国战略司令部下的一个次级联合司令部。相关网址:https://www.washingtonpost.com/news/checkpoint/wp/2017/08/18/president-trump-announcesmove-to-elevate-cyber-command/?utm_term=.89418d32a0d9http://www.stratcom.mil/Media/Factsheets/Factsheet-View/Article/960492/us-cyber-command-uscybercom/
    (32)根据美国网军司令部资料绘制,网址:http://www.arcyber.army.mil/Pages/USCyber Command.aspx(访问时间:2017年4月19日).
    (33)根据美国防部资料绘制,网址:http://dcmo.defense.gov/Portals/47/Documents/OSD%20DA-FA%20Organization.pdf https://www.defense.gov/About/Military-Departments/Unified-Combatant-Commands/(访问时间:2017年4月19日).
    (34)NSA.gov.https://www.nsa.gov/about/faqs/(访问时间:2017年4月19日).
    (35)Curtis L.The Cyber Bridge to Improved India-U.S.Cooperation,The Heritage Foundation.Oct,2014.http://www.heritage.org/asia/commentary/the-cyber-bridge-improved-india-us-cooperation(访问时间:2017年5月9日).
    (36)Framework for the U.S.-India Cyber Relationship.The White House,June 2016.https://obamawhitehouse.archives.gov/the-press-office/2016/06/07/fact-sheet-framework-us-india-cyber-relationship(访问时间:2017年7月1日).
    (37)Rand Corporation.Strengthening Strategic Cooperation.US-Japan Alliance Conference.2016.https://www.rand.org/content/dam/rand/pubs/conf_proceedings/CF300/CF351/RAND_CF351.pdf(访问时间:2017年6月20日).
    (38)The Department of Defense,Cyber Strategy.https://www.defense.gov/News/Special-Reports/0415_Cyber-Strategy(/访问时间:2017年6月18日).
    (39)Lord M.and Sharp T.Americas Cyber Future:Security and Prosperity in the Information Age.Washington,DC:Center for a New American Security,2011.1:20-24.
    (40)Lewis J A,Langevin J R,Mc Caul M.Securing cyberspace for the 44th presidency.Center for Strategic and International Studies,2008,8.
    (41)Hunt C,Chesser N.Deterrence 2.0:Deterring Violent Non-State Actors in Cyberspace.Workshop Proceedings,Arlington,VA:US Strategic Command Global Innovation and Strategy Center.2008.p.141
    (42)Political denial-of-service attacks on the rise,Homeland Security News Wire,Mar.,2009.http://www.homelandsecuritynewswire.com/political-denial-service-attacks-rise(访问时间:2017年4月20日).
    (43)Lewis J A.Cyber Threat and Response:Combating Advanced Attacks and Cyber Espionage.Center for Strategic and International Studies,2014.p.4.
    (44)Kenneth Geers.Strategic cyber security,June 2011.https://ccdcoe.org/publications/books/Strategic_Cyber_Security_K_Geers.PDF(访问时间:2017年6月12日).
    (45)US Department of Defense.The Do D Cyber Strategy.Washington,DC:US Government Printing Office,Mar.2015.https://www.defense.gov/Portals/1/features/2015/0415_cyber-strategy/Final_2015_Do D_CYBER_STRATEGY_for_web.pdf(访问时间:2017年4月22日).
    (46)Lynn W J.Defending a new domain.Foreign Affairs,Sep.2010.https://www.foreignaffairs.com/articles/united-states/2010-09-01/defending-new-domain(访问时间:2017年4月24日).
    (47)Havely J.When states go to cyber-war.BBC News Online,Feb.2000.http://news.bbc.co.uk/2/hi/science/nature/642867.stm(访问时间:2017年3月24日).
    (48)Baker S A,Waterman S,Ivanov G.In the crossfire:Critical infrastructure in the age of cyber war.Mc Afee,Incorporated,2009.p.33.
    (49)Timberg,Craig,and Lisa Rein.“Senate cybersecurity report finds agencies often fail to take basic preventive measures.”The Washington Post,Feb.2014,https://www.washingtonpost.com/business/technology/senate-cybersecurity-report-finds-agencies-often-fail-to-take-basic-preventive-measures/2014/02/03/493390c2-8ab6-11e3-833c-33098f9e5267_story.html?utm_term=.8a30a662fb82(访问时间:2017年3月24日).
    (50)Lynn W J.Defending a new domain.Foreign Affairs,Sep.2010.https://www.foreignaffairs.com/articles/united-states/2010-09-01/defending-new-domain(访问时间:2017年4月24日).
    (51)Kenneth Geers.Strategic cyber security,June 2011.https://ccdcoe.org/publications/books/Strategic_Cyber_Security_K_Geers.PDF(访问时间:2017年6月12日).
    (52)Carl Hunt,Chesser N.Deterrence 2.0:Deterring Violent Non-State Actors in Cyberspace.Workshop Proceedings,Arlington,VA:US Strategic Command Global Innovation and Strategy Center.2008.p.18.
    (53)Nathan Thornburgh.The invasion of the Chinese cyberspies.Time,Aug.2005.http://content.time.com/time/magazine/article/0,9171,1098961,00.htm(l访问时间:2017年7月12日).
    (54)Colin Gray.Making Strategic Sense of Cyber Power:Why The Sky is Not Falling,April 2013.https://ssi.armywarcollege.edu/pdffiles/PUB1147.pdf(访问时间:2017年5月12日).
    (55)Nando Times.U.S.Official Warns of Future Attacks on Vital Computer Systems,Nov.2001.http://www.nando.net/technology/story/172635p-1669909c.html(访问时间:2017年5月2日,此链接需通过archive.org打开).
    (56)Thomas Rid.Cyberwar and Peace:Hacking can reduce real-world violence.Foreign Affairs.Nov.2013.https://www.foreignaffairs.com/articles/2013-10-15/cyberwar-and-peace(访问时间:2017年6月12日).
    (57)Amitai Etzioni.Cybersecurity in the private sector.In Science and Technology,Fall 2011.http://issues.org/28-1/etzioni-2(/访问时间:2017年5月3日).
    (58)Help Net Security,73%of Organizations Hacked,Feb.2011.https://www.helpnetsecurity.com/2011/02/08/73-of-organizations-hacked-in-the-last-2-years(/访问时间:2017年4月26日).
    (59)Homeland Security News Fire“Russia may launch crippling cyberattacks on U.S.in retaliation for Ukraine sanctions”,May 2014,http://www.homelandsecuritynewswire.com/dr20140502-russiamay-launch-crippling-cyberattacks-on-u-s-in-retaliation-for-ukraine-sanctions(访问时间:2017年5月26日).

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700