Academic Master

Software Engineering

International Cybersecurity Environmental Scan Template for China

Country: CHINA

What unique characteristics of the country’s culture make cyberspace issues more challenging?

One of China’s cyber security’s most extraordinary distinguishing characteristics is the desire to achieve global dominance in every way possible. With the ability to conduct harmful cyber activities against other superpower countries like the US, China is currently the international threat actor for cyber espionage. Despite being one of the world’s major hubs for hackers, the Chinese government has consistently denied involvement in inappropriate online behavior. Hence making it hard for other nations to defeat China’s cyber threats.

If you projected forward into the next decade, what things do you think will change?

China will have achieved its goal of gaining world dominance in cyber security.

What could be the catalyst(s) for change?

Attacks from China’s ongoing adversaries would catalyze change. China is a very aggressive country that launches attacks without first seeking political backing. China will soon gain the upper hand and defeat some adversaries.

From an economic perspective, is it possible that the country will take a different approach concerning cyberspace than it has in the past?

China will be less reliant on its financial situation economically and more aggressive in its security operations. Maintaining effective defenses in a war requires significant financial support; efforts to defend against cyber-attacks seem never-ending and crucial to ending all hostilities.

From the criminality perspective, does the country do enough in cyberspace?

Based on following, China is practicing enough cyberspace;

  • China is positioned to conduct policy, enforce laws, and promote voluntary information sharing to increase mutual trust and lessen misunderstandings and errors in judgment. The states step up their efforts to help and cooperate with ICT security. China also ensures that no malicious cyber crimes against the state are committed under the pretense of offering support.
  • China has been at the forefront of improving international cooperation in addressing cyber security threats and problems. The Chinese government forbids terrorist groups from using online platforms such as websites to engage in terrorist activities like the production, distribution, and broadcast of violent terrorist rhetoric and the publication and distribution of terrorist audio and video materials. China also exchanges intelligence and upholds legislation that forbids cyberterrorism.

What changes would you suggest if you were the US ambassador to these countries?

I would see that they had the appropriate identification, authentication, and access to the internet. LHDs can identify system users and confirm that data comes from a trustworthy source using identification and authentication techniques like IDs and passwords. Since many professionals collect private information from various sources, public health depends on responsible identification and authentication techniques.

I will implement the use of artificial intelligence in all sectors. I would use AI and machine learning together to alter cybersecurity significantly. Automatic threat detection, face recognition, natural language processing, and automated security systems have all benefited greatly from artificial intelligence. Clever malware and attacks can get around the most recent data security protocols. Threat detection systems with AI capabilities can predict upcoming attacks and alert administrators immediately to any data breach.

Describe and discuss the potential impact of your recommendations.

To curb these cyber security and terrorism problems, I would recommend that the government of China and the US should make join efforts to fight against these threats. The government would help clean these threats by implementing rules and regulations that every cyber user must follow. If nations worldwide do not aid them, black hat hackers, cyberterrorists, and fraudsters will have a harder time concealing their operations. The threat of cybercrime to potential offenders would be reduced because governments would be more likely to bring criminals to justice. Further reducing cyber security threats would be the development of strong national, regional, and international collaborations with stakeholders in the private and public sectors. The partnership would include joint training, using the relevant community, and responding to and recovering from damage caused by terrorist attacks on critical infrastructure facilities.

References

Austin, G. (2018). Cybersecurity in China: The next wave. Springer International Publishing.

SEARCH

Top-right-side-AD-min
WHY US?

Calculate Your Order




Standard price

$310

SAVE ON YOUR FIRST ORDER!

$263.5

YOU MAY ALSO LIKE

Pop-up Message