期刊文献+

特朗普政府网络安全政策的调整及未来挑战 被引量:10

The Adjustment and Future Challenges of the Trump Administration’s Cyber Security Policy
原文传递
导出
摘要 特朗普上台后,美国政府对网络安全政策进行了一定程度的调整。随着美国政府、国会和部分战略界人士把应对与中俄之间的大国竞争作为国家安全战略重点,特朗普政府把网络空间的大国竞争作为美国面临的主要挑战。为了维护在数字空间的优势地位,美国政府加强了对关键基础设施的保护,努力推动数字经济发展,大力提升网络军事能力。相较于奥巴马政府,特朗普政府的网络安全政策进攻性更强,客观上推动了网络空间的军事化进程。在"美国优先"和"以实力谋和平"的思想指导下,美国从自身的利益和需求出发处理网络空间事务,其激进的网络战略强化了大国博弈和网络威慑行动,同时也导致全球网络治理进展缓慢。尽管美国力图在数字空间建立持久的优势,但它必须面对一系列挑战。 After Trump came to power,the U.S.government made some adjustments to cyber security policy.As the U.S.government,Congress and some strategic persons regard dealing with the competition between China and Russia as the strategic focus of national security,the Trump Administration regards the competition of great powers in cyberspace as the main challenge facing the United States.In order to maintain its dominant position in digital space,the U.S.government has strengthened the protection of key infrastructure,worked hard to promote the development of digital economy,and vigorously enhanced its cyber military capability.Compared with the Obama Administration,the Trump Administration’s cybersecurity policy is more aggressive and objectively promotes the militarization of cyberspace.Under the guidance of the ideology of"America First"and"Achieving Peace Through Strength,"the United States handles cyberspace affairs in light of its own interests and needs.The U.S.aggressive cyber strategy strengthens the game of big powers and the action of network deterrence,and at the same time leads to slow progress of global cyber governance.Although the United States tries to build a lasting advantage in digital space,it faces a series of challenges.The leadership of the United States in cyberspace will not be enhanced by the development of cyber forces,and its attempt to establish global cyber hegemony is bound to be difficult to achieve.
作者 李恒阳 Li Hengyang
出处 《美国研究》 CSSCI 北大核心 2019年第5期41-59,5,6,共19页 The Chinese Journal of American Studies
  • 相关文献

参考文献12

二级参考文献64

  • 1刘正.网络战的国际法应对[J].山东社会科学,2006(3):139-141. 被引量:8
  • 2Charles E. Croom, Jr., "Guarding Cyberspace Global ,, Network Operations , Joint Force Quarterly, No. 46, 3^rd Quarter, July 2007,p. 69.
  • 3Department of Defense Strategy for Operating in Cyberspace, July 2011, p. 2. http.//www, defense, gov/news/d20110714cyber.pdf,访问日期.2012年5月6日.
  • 4Tang Lan and Zhang Xin, "Can Cyber Deterrence Work?", in Andrew Nagorski , Ed. , Global Cyber Deterrence . Views from China, the U. S. , Russia, India, and Norway, April 2010, p. 1, www. ewi. info/ systerr-/ files/ CyberDeterrenceWeb. pdf,访问日期.2012年5月7日.
  • 5Bryan Krekel, Patton Adams, George Bakos, "Occupying the Information High Ground. Chinese Capabilities for Computer Network Operations and Cyber Espionage", March 7,2012, p. 110, p. 12, p. 10. http.//www, uscc. gov/RFP/ 2012/USCC% 20Report_ Chinese _ Capabilities forComputer_NetworkOperationsandCyberEspionage.pal,访问日期.2012年5月7日.
  • 6Amy Chang, "Indigenous Weapons Development in China's Military Modernization", U. S.-China Economic and Security Review Commission Staff Research Report, April 5, 2012. http.//www, uscc. gov/researchpapers/2012/ China-Indigenous-Military-Developments-Final-Dra ft-03-A-pril2012.pal,访问日期.2012年5月6日.
  • 7Wendell Minnick, "China's 10 Killer Weapons. Comprehen- sive Strategy Targets U.S. Presence in Asia-Pacific", Defense News, 9 April, 2012.
  • 8General Norty Schwartz, "Space, Cyberspace, and National Security", 18 February 2010, p. 2, http.//www, af. mil/ shared/media/document/AFD-100219-034, pdf, 访问日期.2012年5月6日.
  • 9The White House, " International Strategy for Cyber- space. Prosperity, Security, and Openness in a Networked World", May 2011, http.//www, whitehouse, gov/sites/de- fault/files/rss viewer/international _strategy _for_ cyberspace.pdf,访问日期.2012年5月8日.
  • 10Department of Defense, Strategy for Operating in Cyberspace, July 2011, http.//timemilitary, files, wordpress. com/201I/07/d20110714cyber.pdf,访问日期.2012年5月7日.

共引文献142

同被引文献119

引证文献10

二级引证文献73

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部