Cyber capabilities and national power - Executive Summary

免费文档

VIP文档

ID:27976

大小:1.63 MB

页数:2页

时间:2023-01-01

金币:0

上传者:战必胜
New IISS Research Paper
Executive Summary
CYBER CAPABILITIES
AND NATIONAL
POWER:
A Net Assessment
This report sets out a new methodology for assessing cyber
power, and then applies it to 15 states:
Four members of the Five Eyes intelligence alliance – the
United States, the United Kingdom, Canada and Australia
Three cyber-capable allies of the Five Eyes states – France,
Israel and Japan
Four countries viewed by the Five Eyes and their allies as
cyber threats – China, Russia, Iran and North Korea
Four states at earlier stages in their cyber-power
development – India, Indonesia, Malaysia and Vietnam
The methodology diers from the index-based approaches
developed by other organisations because it is broader and
principally qualitative, analysing the cyber ecosystem of
each state and how it intersects with international security,
economic competition and military aairs. The states are
assessed in seven categories:
Strategy and doctrine
Governance, command and control
Core cyber-intelligence capability
Cyber empowerment and dependence
Cyber security and resilience
Global leadership in cyberspace aairs
Oensive cyber capability
THREE TIERS OF CYBER POWER
We have divided the 15 states into three tiers of cyber power.
Our rst tier is for states with world-leading strengths
across all the categories in the methodology. We conclude
that only the United States merits inclusion.
Our second tier is for states that have world-leading
strengths in some of the categories. The states we place at
that level are, in alphabetical order, Australia, Canada,
China, France, Israel, Russia and the United Kingdom.
Our third tier is for states that have strengths or potential
strengths in some of the categories but signicant weaknesses
in others. We conclude that India, Indonesia, Iran, Japan,
Malaysia, North Korea and Vietnam are at that level.
Any aempt at a more granular ranking within the second
and third tiers would depend on the degree of importance
aributed to each category.
In the second tier, if a combination of world-class cyber
security, world-class cyber intelligence, sophisticated
oensive cyber capability and powerful cyber alliances
were deemed key, Israel and the UK would probably be
top. Alternatively, if the decisive factors were the amount
of resources both human and nancial devoted to cyber,
unrestrained operational boldness and day-to-day experience
of running cyber-enabled information operations, China and
Russia would probably be the leading second-tier states. But
overall, mainly because of its large and growing indigenous
digital-industrial capacity, we conclude that only China is
currently on a trajectory to join the US in the rst tier.
In the third tier, Malaysia would be top if core strength
in cyber security were the most important criterion. If
operational boldness and experience were key, Iran would
lead. However, given its world-leading internet-related high-
tech industry, we conclude that Japan is best placed, in the
long term, to rise into the second tier.
This report provides conrmation of the likely durability
of US digital-industrial superiority, including through
international alliances, for at least the next ten years. There
are two strands to this judgement. The rst is that in advanced
cyber technologies and their exploitation for economic and
military power, the US is still ahead of China. The second is
资源描述:

当前文档最多预览五页,下载文档查看全文

此文档下载收益归作者所有

当前文档最多预览五页,下载文档查看全文
温馨提示:
1. 部分包含数学公式或PPT动画的文件,查看预览时可能会显示错乱或异常,文件下载后无此问题,请放心下载。
2. 本文档由用户上传,版权归属用户,天天文库负责整理代发布。如果您对本文档版权有争议请及时联系客服。
3. 下载前请仔细阅读文档内容,确认文档内容符合您的需求后进行下载,若出现内容与标题不符可向本站投诉处理。
4. 下载文档时可能由于网络波动等原因无法下载或下载错误,付费完成后未能成功下载的用户请联系客服处理。
关闭