Capability of the Peoples Republic of China to Conduct Cyber Warfare and Computer Network Exploitation Bryan Krekel

ISBN:

Published:

Kindle Edition


Description

Capability of the Peoples Republic of China to Conduct Cyber Warfare and Computer Network Exploitation  by  Bryan Krekel

Capability of the Peoples Republic of China to Conduct Cyber Warfare and Computer Network Exploitation by Bryan Krekel
| Kindle Edition | PDF, EPUB, FB2, DjVu, talking book, mp3, ZIP | | ISBN: | 4.62 Mb

The government of the Peoples Republic of China (PRC) is a decade into a sweeping military modernization program that has fundamentally transformed its ability to fight high tech wars. The Chinese military, using increasingly networked forcesMoreThe government of the Peoples Republic of China (PRC) is a decade into a sweeping military modernization program that has fundamentally transformed its ability to fight high tech wars. The Chinese military, using increasingly networked forces capable of communicating across service arms and among all echelons of command, is pushing beyond its traditional missions focused on Taiwan and toward a more regional defense posture.

This modernization effort, known asinformationization, is guided by the doctrine of fighting Local War UnderInformationized Conditions, which refers to the PLAs ongoing effort to develop a fully networked architecture capable of coordinating military operations on land, in air, at sea, in space and across the electromagnetic spectrum.China is likely using its maturing computer network exploitation capability to support intelligence collection against the US Government and industry by conducting a long term, sophisticated, computer network exploitation campaign.

The problem is characterized by disciplined, standardized operations, sophisticated techniques, access to high-end software development resources, a deep knowledge of the targeted networks, and an ability to sustain activities inside targeted networks, sometimes over a period of months.The depth of resources necessary to sustain the scope of computer network exploitation targeting the US and many countries around the world coupled with the extremely focused targeting of defense engineering data, US military operational information, and China-related policy information is beyond the capabilities or profile of virtually all organized cybercriminal enterprises and is difficult at best without some type of state-sponsorship.



Enter the sum





Related Archive Books



Related Books


Comments

Comments for "Capability of the Peoples Republic of China to Conduct Cyber Warfare and Computer Network Exploitation":


1stpreshonesdale.com

©2009-2015 | DMCA | Contact us