Cyber Capabilities and National Power - Net Assessment

免费文档

VIP文档

ID:27980

阅读量:2

大小:0.25 MB

页数:4页

时间:2023-01-01

金币:0

上传者:战必胜
CYBER CAPABILITIES AND NATIONAL POWER: A Net Assessment 171
Net Assessment
Based on the country studies in the report, we can
draw conclusions about the ways in which states have
responded to the opportunities and threats presented
by cyber capabilities. In addition to considering sepa-
rately each of the categories in our methodology, we
can also draw conclusions about the relative standing
of the 15 countries and the implications for the broader
global balance of power.
Foundations of cyber power
On published strategy and doctrine, the country studies
reveal considerable variation in practice, especially on
the balance between policies for cyber security on the
one hand and policies for intelligence-related, politi-
cal and military uses of cyber assets on the other. All
countries maintain high levels of secrecy around the lat-
ter three areas. All the countries studied in this report
now have some published strategy, doctrine or policy
in at least one of the diverse aspects of cyber power.
The United States led the way by publishing cyber poli-
cies from the mid-1990s onwards. It now has the most
mature and comprehensive policy seings. While some
other states also produced discrete elements of strate-
gic and doctrinal cyber thinking in the 1990s, it was not
until the late 2000s that the rst wave of policies compa-
rable in breadth and depth to those of the US were pro-
duced. This was followed by a second wave from 2015
onwards. Each study reveals a unique blend of civilian
and military elements, reecting the particular strategic
circumstances and policy preoccupations of that coun-
try. Given the rapidly evolving nature of cyber threats
and opportunities, none of the countries studied is com-
fortable with its level of maturity on strategy.
National dierences also play out in the arrange-
ments for governance, command and control. Here, the
political culture of each country is immediately visible
as the primary determinant of governance arrange-
ments. Liberal democracies in advanced economies
such as France, Japan, the United Kingdom and the
US tend to have more well-established arrangements
for cyber governance compared with democracies in
the wealthier developing countries (India, Indonesia
and Malaysia). In the laer group, governance arrange-
ments have developed more slowly and unevenly, as
have security strategies for cyberspace. In more authori-
tarian countries such as China, Iran, North Korea and
Russia, the governance arrangements are more nar-
rowly focused and less transparent. Of those four coun-
tries, only China might be said to have an established
framework for a multi-stakeholder approach to cyber
governance, although its political system favours the
Chinese Communist Party as the dominant stakeholder.
A core cyber-intelligence capability is the primary foun-
dation of cyber power. Any country’s ability to take
defensive or oensive action in cyberspace is funda-
mentally dependent on its understanding of the cyber
environment – its cyber situational awareness. This can
be constructed by combining all available sources of
information from across the private and public sectors.
The most eective intelligence agencies must also have
the capability to detect and aribute sophisticated state-
based cyber aacks and to conduct sophisticated cyber
operations of their own. While many states around the
world have cyber capabilities focused on their own
internal security, and some have developed a regional
intelligence footprint, only a few have sucient reach to
achieve the level of global cyber understanding essen-
tial for the most sophisticated operations. Those states
are the Five Eyes intelligence allies (Australia, Canada,
New Zealand, the UK and the US), which operate
资源描述:

当前文档最多预览五页,下载文档查看全文

此文档下载收益归作者所有

当前文档最多预览五页,下载文档查看全文
温馨提示:
1. 部分包含数学公式或PPT动画的文件,查看预览时可能会显示错乱或异常,文件下载后无此问题,请放心下载。
2. 本文档由用户上传,版权归属用户,天天文库负责整理代发布。如果您对本文档版权有争议请及时联系客服。
3. 下载前请仔细阅读文档内容,确认文档内容符合您的需求后进行下载,若出现内容与标题不符可向本站投诉处理。
4. 下载文档时可能由于网络波动等原因无法下载或下载错误,付费完成后未能成功下载的用户请联系客服处理。
关闭