期刊文献+

网络安全与澳美同盟 被引量:1

Cyber Security and U.S.-Australia Alliance
原文传递
导出
摘要 在信息化高速发展的时代,网络空间承载着国家安全、军事和情报合作的重荷,导致同盟面临网络攻击具有相当的脆弱性。为应对和打击潜在对手,澳大利亚和美国宣布将网络安全纳入合作的范围,提出拒止性威慑和惩罚性威慑战略。美澳实施网络威慑战略可增强威慑实力,但也面临挑战。网络空间的固有特点影响威慑战略的有效实施;网络威慑战略的实施有可能引发网络军备竞赛,更不利于维护网络安全。通过有效的沟通磋商机制,建立和谐、安全的网络空间,加强合作,实现共同安全,而不是建立在冷战思维指导下的针对第三方的网络同盟,是实现网络安全的最终途径。 With the rapid development of information technology,cyberspace is now serving a crucial function in national security,military and intelligence cooperation.However,the internet leaves the alliance vulnerable to network attack.To address threats and fight prospective rivals,Australia and the United States have announced that their alliance will extend into cyberspace.They put forward the strategy of deterrence through punishment and through denial.Their adoption of strategy of cyber deterrence could enhance the deterrent strength,but faces challenges.In this paper,three aspects of their joint cooperation in cyberspace will be discussed:motivation of cyber security cooperation between the two countries,strategy to respond to cyber threats,and,current and future challenges they will meet.Intrinsic characteristics of cyberspace lead to ineffective implementation of cyber deterrence strategy.Implementation of cyber deterrence strategy could trigger arms race,which is not conducive to maintaining cyber security.Through effective mechanisms of communication and consultation,through establishing harmonious and secure cyberspace,achieving common security by cooperation,rather than cyber security alliance under the guidance of the cold war mentality in view of the third party,is the ultimate way of cybersecurity.
作者 岳小颖
出处 《美国研究》 CSSCI 北大核心 2013年第3期51-61,6,共11页 The Chinese Journal of American Studies
  • 相关文献

参考文献21

  • 1"Australia-United States Ministerial Consultations (AUSMIN) 2011 Joint Communique", Media Note, Of- fice of the Spokesperson, San Francisco, California, 15 September 2011, available at.. http. //www. state. gov/r/pa/prs/ps/2011/09/172517, htm.
  • 2"Intelligence Sharing Between Australia and the U. S. ," The 2005 AUSMIN Joint Communique, available at. http; //www. dfat. gov. au/geo/us/ausmin/ausmin05 _joint_ communique, html.
  • 3Joint press conference with Secretary of State Hillary Clinton, Secretary of Defense Leon Panetta, Minister for Foreign Affairs Kevin Rudd and Minister for Defence Stephen Smith, 16 September, 2011, available at. http.. //www. minister, defence, gov. au/2011/09/16/minister-for-defence-%E2%80%93-joint- press - conference - with- secretary- of- state- hillary- clinton - secretary - of - defense - leon- panetta - minister- for- foreign- affairs- kevin- rudd - and- minister- for- defence - steph/.
  • 4William J. Broad and David E. Danger, "Worm Was Perfect for Sabotaging Centrifuges, " New York Times, November 18 2010, available at.. http. // www. nytimes, com/2010/11/19/world/ middleeast/ 19stuxnet. html; Ralph Langner, "Cracking Stuxnet, A 21st-century Cyber Weapon," TED, March 2011, available at.. http.. //www. ted. corn/talks/ralph langner_ cracking_ stuxnet _ a _ 21st _ century _ cyberweapon, html? awesm= on. ted. com_ Langner&utm _ content= awesm- puhlisher&utm _ me- dium-on, ted. com-statie&utm _sonllreo=langner.com.
  • 5Joseph Nye, The Future of Power ( PublicAffairs, 2011), p. 145. Brian Grow and Mark Hosenball, "Spe- cial Report. in Cyberspy vs. Cyberspy, China Has the Edge", Reuters, April 14, 2011, available at. ht- tp. //www. reuters, com/article/2011/O4/14/us-china-usa-cyberespionage-idUSTRE73D24220110414.
  • 6Elizabeth Montalbano, "Federal Cyber Attacks Rose 39%, Information Week, March 2011, available at. http. //www. informationweek, corn/news/government/security/229400156.
  • 7"Pentagon to Help Protect U. S. Cyber Assets, Infrastructure," May 2011, avaible at.. http. //www. homeIandsecuritynewswire. corn/pentagon- help- protect- us- cyber- assets- infrastructure.
  • 8Phil Stewart and Jim Wolf., "Old Worm Won't Die after 2008 Attack on Military, " Reuters, June 2011, a- vailable at. http.. //www. reuters, com/article/2011/06/17/us - usa - cybersecurity- worm - idUS- TRE75FSTB20110617.
  • 9The White House, International Strategy for Cyberspace. Prosperity, Security, and Openess in a Net- worked World, p. 11, May 2011, available at. http.. //www. whitehouse, gov/sites/default/files/rss_ viewer/international _ strategy_ for_ cyberspaee, pdf.
  • 10The White House, International Strategy for Cyberspace. Prosperity, Security, and Openess in a Net- worked World, p. 1, May, 2011, available at.. http. //www. whitehouse, gov/sites/default/files/rss viewer/international _ strategy_ for_ cyberspace, pdf.

二级参考文献21

  • 1Franklin D. Kramer and Lan-y Wentz, "Cyber Influence and International Security", Defense Horizons, No. 61, January 2008, p. 1.
  • 2John Rollins & Anna C. Henning, " Comprehensive National Cybersecurity Initiative: Legal Authorities and Policy Considerations", Congressional Research Service, 7 - 5700, 10 March 2009, http:// www. fas. org/sgp/crs/natsec/R40427, pdf, p. 4.
  • 3Stephen W. Korns, " Cyber Operations : The New Balance" , Joint Force Quarterly,lssue 54, 3rd quarter 2009, p. 99.
  • 4Stephen W. Korns, "Cyber Operations: The New Balance", Joint Force Quarterly, Issue 54, 3 rd quarter 2009, p. 99.
  • 5“美国研发智能电网应对大面积停电事故”,http://www.csee.org.cn/data/2009/0807/article_4022.htm.
  • 6" Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure ", http ://www. whitehouse, gov/assets/documents/Cyberspace_Policy_Review_final, pdf, p. 2.
  • 7Defense Science Board ( DSB ), "' Defense Imperatives for the New Administration", August 2008, http ://www. acq. osd. mil/dsb/reports/2008 - 11 - Defense Imperatives. pdf, p. 3.
  • 8Center for Strategic and International Studies, "Securing Cyberspace for the 44th Presidency : A Report of the CSIS Commission on Cybersecurity for the LMth Presidency", December 2008, http ://csis. org/ files/media/csis/pubs/081208_securingcyberspace_44, pdf, p. 11.
  • 9"Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure", pp. 1 -5.
  • 10John Rollins & Anna C. Henning, '" Comprehensive National Cybersecurity Initiative: Legal Authorities and Policy Considerations", 10 March 2009.

共引文献25

同被引文献13

引证文献1

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部