Published August 16, 2020 | Version Published
Journal article Open

CHINA'S INFORMATION SECURITY STRATEGY: POLITICAL AND TECHNICAL ASPECTS

Description

The growing role of information technology poses new challenges for the modern state, which include attempts by foreign agents to conduct cyber espionage against government agencies, companies and citizens, as well as the desire of the warring party to undermine important information infrastructure. The relevance of this topic is due to the increasing activity of the People's Republic of China in the global information space, as well as the actions of Chinese government services to ensure internal information security and the organization of cyber attacks on the information infrastructure. The purpose of this article is to assess the course pursued by China on ensuring information security, as well as to identify trends in the perception of threats to national security in the information sphere among representatives of the Chinese political elite. In this regard, the structures in the state apparatus of China that are in charge of this area are considered. Despite the noticeable actions of the representatives of the “fifth generation” of the leaders of the PRC in the aspect of cybersecurity, a single organization has not been formed in the state structure that would be responsible for developing a political course in the information sphere. In addition to the Central Military Council, the Communist Party of China and the State Council of the PRC are engaged in this. At the same time, the structure of the departments responsible for cybersecurity in the last two bodies copies the corresponding structure in the country's armed forces. A special place in ensuring China's cyberspace is given to the Central Leading Group on Cybersecurity and Informatization. The main aspects of protection against information and social threats include: The Golden Shield, the cyber security factor, and state Internet trolling. The study considers not only the political aspect of the issue, but also its technical part.

Files

Download_Chekmeneva.pdf

Files (536.5 kB)

Name Size Download all
md5:685ec8712ba26a81f4dcb97c826ab389
536.5 kB Preview Download

Additional details

Related works

Is reviewed by
Journal article: http://bulletensocial.com/archive/en/9/9 (URL)