毕业论文

当前位置: 毕业论文 > 英语论文 >

中美两国的网络安全比较(3)

时间:2023-08-27 21:36来源:英语论文
Despite the great controversy, most security experts agree that it is important to seriously define the definition of security, and there are at least three reference factors, and for any community, s

Despite the great controversy, most security experts agree that it is important to seriously define the definition of security, and there are at least three reference factors, and for any community, security should include defending core values, the threaten and political goals。 Redefinition needs to think about three broad issues again: the goal of security, the means of protecting security, and the connection between security and domestic affairs。 And the essence of these three broad questions is to think about these three questions: Who got the problem of security? How to study is? How to protect the security? 

1。2 What is cybersecurity?论文网

After the Cold War, the non-traditional security research was put on the agenda by the international political reality, and it increasingly gets the attention of the whole world。 The reality of international politics has expanded the concept of security, and the enrichment of security connotation has accelerated the process of new security research。 The enrichment of information security and the concept of cybersecurity and the deepening of research are the result of the objective demand of international politics。 It is also the result of expansion and deepening of security theory。

Internet and information security generally include network availability, network operation security, application system reliability, confidentiality of information transmission, control of information dissemination and other issues。 Cybersecurity generally refers to the software, hardware, data of the computer system is protected from accidental or malicious factors and these things keep the system continuous, normal operation。 From the technical point of view, its essence is to ensure the integrity, confidentiality, availability, non-repudiation, controllability of the system and information; from the national security level, it refers to protecting the network system and information security which has an important role in the country and society from other countries and inpiduals malicious attacks and destruction, so as to ensure the effective implementation of national strategies。 Therefore, cybersecurity not only involves cybersecurity technology, as an important national infrastructure and the "fifth space" it has become important issues which is involved in national sovereignty and national security。

1。3 Disputes about cybersecurity

At present, there are many disputes about cybersecurity。 In general, there are three main perspectives on the impact of cybersecurity interactions on international politics and national strategies。

The first category is the cybersecurity threat concerns, some scholars believe that the network conflict will become a new model of international conflict; it will undermine the strategic stability, even subvert the new order of international relations。 The second category is the cybersecurity utility skepticism, some scholars believe that the network attack is difficult to become an effective means of national strategy, the factor which plague the network defender also plagued the network of attackers。 Network technology is a double-edged sword。 And they also believe that the cybersecurity interaction between countries is largely a continuation of geopolitical activity。

These two perspectives form a diametrically opposed situation, one believes that cybersecurity will bring disruptive changes to international politics, and the other pointed out that cybersecurity is not sufficient to interact with a profound impact on the international political situation。 This view of contention is not only at the level of academic research, but also in the global political game, because the qualitative nature of cyberspace and its security issues have important implications for the principles and mechanisms of global governance。 Therefore, security not only refers to an objective state, but also should be understood as the inter-subjectivity of social construction products。 By transplanting this logic into the field of cybersecurity, the third perspective is different from the viewpoints of the above two。 The influence of cybersecurity is not an objective given state, but a subjective cognition formed under the structure of discourse and behavior。 That is the discourse of cybersecurity construction theory。 This perspective argues that the exaggerated description or underestimation of cybersecurity reflects a different "shared subjectivity" and thus it focuses on how a particular security actor can effectively construct and express a cybersecurity threat。 文献综述 中美两国的网络安全比较(3):http://www.youerw.com/yingyu/lunwen_195613.html

------分隔线----------------------------
推荐内容