Occupying the information high ground : Chinese capabilities for computer network operations and cyber espionage (eBook, 2012) [WorldCat.org]
skip to content
Occupying the information high ground : Chinese capabilities for computer network operations and cyber espionage
Checking...

Occupying the information high ground : Chinese capabilities for computer network operations and cyber espionage

Author: Bryan A Krekel; Patton Adams; George Bakos; Northrop Grumman Corporation,; U.S.-China Economic and Security Review Commission,
Publisher: [Washington, D.C.] : U.S.-China Economic and Security Review Administration, 2012.
Edition/Format:   eBook : Document : National government publication : EnglishView all editions and formats
Summary:
Concern in the United States over alleged Chinese penetrations of both commercial and government networks has only intensified in the past two years as successive incidents have come to light in the media and more organizations voluntarily come forward. The Commission requested a study that both reviewed developments since the 2009 study was completed and examined new issues related to cybersecurity, China, and  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Material Type: Document, Government publication, National government publication, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Bryan A Krekel; Patton Adams; George Bakos; Northrop Grumman Corporation,; U.S.-China Economic and Security Review Commission,
OCLC Number: 779781577
Notes: "Prepared for the U.S.-China Economic and Security Review Commission by Northrop Grumman Corp."
"March 7, 2012."
Description: 1 online resource (136 pages)
Contents: Acronyms. --
Scope note. --
Executive summary. --Information warfare: doctrine, strategy, and training. --
Chinese wartime use of computer network operations. --
Key entities in Chinese information warfare operations and research. --
State-sponsored computer network operations research in Chinese academia. --
Chinese telecommunications R & D --
state and commercial cooperation pushing industry growth. --
U.S. telecommunications supply chain vulnerabilities. --
A comparative analysis of criminal vs. state-sponsored network exploitation. --
Collaboration of U.S. and Chinese information security firms: risks and reality. --
Conclusion.--
Glossary of technical terms. --
Bibliography.
Responsibility: Bryan Krekel, Patton Adams, George Bakos.

Abstract:

Concern in the United States over alleged Chinese penetrations of both commercial and government networks has only intensified in the past two years as successive incidents have come to light in the media and more organizations voluntarily come forward. The Commission requested a study that both reviewed developments since the 2009 study was completed and examined new issues related to cybersecurity, China, and potential risks to U.S. interests. Specifically, Northrop Grumman information security analysts were tasked by the Commission to address: 1. The state of development in Chinese cyber-warfare strategy including the major military institutions and authors prominent in developing employment concepts and strategic guidance for the People's Liberation Army (PLA); 2. New developments in Chinese practices and capabilities for computer network exploitation to support intelligence penetration and collection against U.S. networks; 3. The potential implications for U.S. military forces in the western Pacific Ocean region, as well as in the continental United States (CONUS) if China staged a network based attack on U.S. systems and infrastructure; 4. The major actors within China (both state-affiliated and state-sponsored) who appear to be engaged in the development computer network operations (CNO) and computer network exploitation (CNE); any identifiable institutional linkages among these groups and government patron organizations supporting them; 5. The activities and research interests of China's most prominent or influential telecommunications research institutes, companies and consortiums and an assessment of any substantive linkages to the PLA, People's Republic of China (PRC) or PRC ministries with security or information technology portfolios; 6. A comparative assessment of the tools and techniques associated with contemporary cyber criminals and with state-sponsored operations originating in China to assess the distinctions that can be drawn in the operations and tools common to cyber criminals and cyber espionage activity; 7. An examination and assessment of the potential network security vulnerabilities, if any, that might be posed by the collaboration between Chinese and U.S. cybersecurity firms.

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.