Jump to ContentJump to Main Navigation
China and CybersecurityEspionage, Strategy, and Politics in the Digital Domain$
Users without a subscription are not able to see the full content.

Jon R. Lindsay, Tai Ming Cheung, and Derek S. Reveron

Print publication date: 2015

Print ISBN-13: 9780190201265

Published to Oxford Scholarship Online: April 2015

DOI: 10.1093/acprof:oso/9780190201265.001.0001

Show Summary Details
Page of

PRINTED FROM OXFORD SCHOLARSHIP ONLINE (oxford.universitypressscholarship.com). (c) Copyright Oxford University Press, 2020. All Rights Reserved. An individual user may print out a PDF of a single chapter of a monograph in OSO for personal use. date: 03 December 2020

From Cyberwarfare to Cybersecurity in the Asia-Pacific and Beyond

From Cyberwarfare to Cybersecurity in the Asia-Pacific and Beyond

Chapter:
(p.123) Chapter 5 From Cyberwarfare to Cybersecurity in the Asia-Pacific and Beyond
Source:
China and Cybersecurity
Author(s):

Ye Zheng

Yang Fan

Publisher:
Oxford University Press
DOI:10.1093/acprof:oso/9780190201265.003.0005

National security now depends on cyberspace, and cyberspace is global. Securing the cyberspace will require international cooperation; however, the threats emanating from cyberspace and cyberwarfare are still poorly understood. Without a clear understanding of cyberwarfare, it will be impossible to improve cybersecurity. This chapter first explains the different types of cyberwarfare threats. It then suggests a number of cybersecurity principles all countries advocating peaceful use of the Internet should observe in order to prevent and reduce the risk of cyberwarfare.

Keywords:   cyberwarfare, cybersecurity, cyber sovereignty, China, Asia-Pacific, strategy

Oxford Scholarship Online requires a subscription or purchase to access the full text of books within the service. Public users can however freely search the site and view the abstracts and keywords for each book and chapter.

Please, subscribe or login to access full text content.

If you think you should have access to this title, please contact your librarian.

To troubleshoot, please check our FAQs , and if you can't find the answer there, please contact us .