Jump to ContentJump to Main Navigation
China and CybersecurityEspionage, Strategy, and Politics in the Digital Domain$
Users without a subscription are not able to see the full content.

Jon R. Lindsay, Tai Ming Cheung, and Derek S. Reveron

Print publication date: 2015

Print ISBN-13: 9780190201265

Published to Oxford Scholarship Online: April 2015

DOI: 10.1093/acprof:oso/9780190201265.001.0001

Show Summary Details
Page of

PRINTED FROM OXFORD SCHOLARSHIP ONLINE (oxford.universitypressscholarship.com). (c) Copyright Oxford University Press, 2020. All Rights Reserved. An individual user may print out a PDF of a single chapter of a monograph in OSO for personal use. date: 04 December 2020

China and Information Security Threats

China and Information Security Threats

Policy Responses in the United States

Chapter:
(p.297) Chapter 12 China and Information Security Threats
Source:
China and Cybersecurity
Author(s):

Fred H. Cate

Publisher:
Oxford University Press
DOI:10.1093/acprof:oso/9780190201265.003.0012

The risks posed by cyberthreats are rapidly escalating as our dependence on stored digital data and digital networks expands. Cyberattacks identified as originating in China, and in some cases alleged to have been launched by the Chinese government itself, are playing an increasingly influential role in motivating policy responses in the United States. Meanwhile, disclosures about US behavior have significantly weakened US credibility. This chapter examines some of the key characteristics of digital data and networked control systems, as well as of the cybersecurity threats that target them; the US regulatory and policy approach to defending against cyberattacks; and the role of China in influencing that approach. It concludes by addressing some critical but unresolved issues about the essential role of law and policy and of the relationship between the United States and China in the fight to secure data and networks.

Keywords:   United States, China, cybersecurity, Internet politics, Sino-American relations, cybersecurity policy

Oxford Scholarship Online requires a subscription or purchase to access the full text of books within the service. Public users can however freely search the site and view the abstracts and keywords for each book and chapter.

Please, subscribe or login to access full text content.

If you think you should have access to this title, please contact your librarian.

To troubleshoot, please check our FAQs , and if you can't find the answer there, please contact us .