Amazon cover image
Image from Amazon.com

21st century Chinese cyberwarfare [electronic resource] : an examination of the Chinese cyberthreat from fundamentals of Communist policy regarding information warfare through the broad range of military, civilian and commercially supported cyberattack threat vectors / William T. Hagestad II.

By: Material type: TextTextPublication details: Ely, Cambridgeshire, United Kingdom : IT Governance Publishing, 2012.Description: 1 online resource (xiv, 314 pages) : illustrationsContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9781849283359 (electronic bk.)
  • 1849283354 (electronic bk.)
Other title:
  • Twenty-first century Chinese cyberwarfare
Subject(s): Genre/Form: Additional physical formats: Print version:: 21st century Chinese cyberwarfare.DDC classification:
  • 303.48 303.48/33
LOC classification:
  • HV6773.15.C97 H34 2012eb online
Online resources:
Contents:
Cover; Title; Copyright; Foreword; Preface; About The Author; Acknowledgements; Contents; Introduction; Glossary; Cyberwarfare Definitions; Types of Hacker; Information Warfare Elements; Chapter 1: The Chinese Cyberthreat; Statistics of the Cyberwarfare Threat; 'Operation Titan Rain'; Statistics of the Chinese Cyberwarfare Threat; Conclusions about the Chinese Cyberthreat; Detailed Statement of the opportunity and problem; Chapter 2: Evolution of Chinese CyberWarfare; Overview of the Attackers; Communist Party of China (CPC); People's Liberation Army (PLA); State-owned Enterprises (SOE).
Civilian Hackers (Hacktivists) Motivation of the People's Republic of China; History & Origins of Information Warfare in the People's Republic of China; An Overview of Chinese Cyberwarfare; Origins of Chinese Cyberwarfare; Purpose behind Chinese Cyberwar Doctrine; China's 'Cyber Command'; Perspectives on China's 'Cyber Command'; Chapter 3: Chinese Unrestricted Warfare; War Without Limits; What is Unrestricted Warfare & who is behind it?; Eight Principles of Chinese Unrestricted Warfare; The Challenge of Information Warfare; Chapter 4: Principles of warfare -- West versus East.
Information Warfare: A new form of people's war ideas Guide Action; Information War Depends on the Integrity of the Information System; Chapter 6: Chinese CyberWarfare Doctrines; Chinese Cyberwarfare Doctrinal Development; Importance of Information Warfare; Goals of Chinese Information Warfare; Integrated Network Electronic Warfare (INEW); The 'Three Warfares' concept; The PRC's concept of 21st century warfare; Secrecy and Deception in PLA Military Strategy; Asymmetric Warfighting; Assassin's Mace Programs; Major General Dai Qingmin's Cyberwar; Conclusions.
Summary: Military doctrine of the People's Republic of China (PRC) envisages war being waged in five spheres: land, sea, air, outer space and cyberspace. The PRC believes that the early degradation, or destruction, of an enemy's command and control infrastructure will significantly improve its chances of ultimate victory. But the Chinese 21st century approach to cyberwarfare is both more sophisticated and comprehensive than that. This book examines the military background to today's doctrines, and explores how the teachings of Sun Tzu, the thirty-six principles from the warring states era and the hard-learnt lessons of Mao's long march infuse and support the modern state's approach to engaging with enemies and rivals. Chinese cyberwarriors, operating from behind the great firewall of China, have substantial campaign experience, and this book reviews operations from Titan Rain -- sustained multi-year cyberattacks against the US that started in 2003 -- to the most recent, ShadyRAT. This book also reviews the contributions made to the overall Chinese cyberstrategy by civilian hackers and state-owned enterprises and looks at how advanced persistent threats already undermine many of China's rival states and enterprises. China's rivals lack a coherent cyberstrategy of their own. They also do not understand the complex cultural, political and historical routes of the modern Chinese state and this is a significant weakness. This book helps everyone with an interest in cybersecurity to "know their enemy".
Holdings
Item type Current library Collection Call number Status Date due Barcode Item holds
eBook eBook e-Library EBSCO Computers Available
Total holds: 0

Includes bibliographical references (pages 275-314).

880-01 Cover; Title; Copyright; Foreword; Preface; About The Author; Acknowledgements; Contents; Introduction; Glossary; Cyberwarfare Definitions; Types of Hacker; Information Warfare Elements; Chapter 1: The Chinese Cyberthreat; Statistics of the Cyberwarfare Threat; 'Operation Titan Rain'; Statistics of the Chinese Cyberwarfare Threat; Conclusions about the Chinese Cyberthreat; Detailed Statement of the opportunity and problem; Chapter 2: Evolution of Chinese CyberWarfare; Overview of the Attackers; Communist Party of China (CPC); People's Liberation Army (PLA); State-owned Enterprises (SOE).

Civilian Hackers (Hacktivists) Motivation of the People's Republic of China; History & Origins of Information Warfare in the People's Republic of China; An Overview of Chinese Cyberwarfare; Origins of Chinese Cyberwarfare; Purpose behind Chinese Cyberwar Doctrine; China's 'Cyber Command'; Perspectives on China's 'Cyber Command'; Chapter 3: Chinese Unrestricted Warfare; War Without Limits; What is Unrestricted Warfare & who is behind it?; Eight Principles of Chinese Unrestricted Warfare; The Challenge of Information Warfare; Chapter 4: Principles of warfare -- West versus East.

880-02 Information Warfare: A new form of people's war ideas Guide Action; Information War Depends on the Integrity of the Information System; Chapter 6: Chinese CyberWarfare Doctrines; Chinese Cyberwarfare Doctrinal Development; Importance of Information Warfare; Goals of Chinese Information Warfare; Integrated Network Electronic Warfare (INEW); The 'Three Warfares' concept; The PRC's concept of 21st century warfare; Secrecy and Deception in PLA Military Strategy; Asymmetric Warfighting; Assassin's Mace Programs; Major General Dai Qingmin's Cyberwar; Conclusions.

Technical Reconnaissance Bureaus (TRB).

Military doctrine of the People's Republic of China (PRC) envisages war being waged in five spheres: land, sea, air, outer space and cyberspace. The PRC believes that the early degradation, or destruction, of an enemy's command and control infrastructure will significantly improve its chances of ultimate victory. But the Chinese 21st century approach to cyberwarfare is both more sophisticated and comprehensive than that. This book examines the military background to today's doctrines, and explores how the teachings of Sun Tzu, the thirty-six principles from the warring states era and the hard-learnt lessons of Mao's long march infuse and support the modern state's approach to engaging with enemies and rivals. Chinese cyberwarriors, operating from behind the great firewall of China, have substantial campaign experience, and this book reviews operations from Titan Rain -- sustained multi-year cyberattacks against the US that started in 2003 -- to the most recent, ShadyRAT. This book also reviews the contributions made to the overall Chinese cyberstrategy by civilian hackers and state-owned enterprises and looks at how advanced persistent threats already undermine many of China's rival states and enterprises. China's rivals lack a coherent cyberstrategy of their own. They also do not understand the complex cultural, political and historical routes of the modern Chinese state and this is a significant weakness. This book helps everyone with an interest in cybersecurity to "know their enemy".

Description based on print version record.

Powered by Koha