9781500254049-1500254045-Cyber Warfare: China's Strategy to Dominate in Cyber Space (Computer Hacking and Security)

Cyber Warfare: China's Strategy to Dominate in Cyber Space (Computer Hacking and Security)

ISBN-13: 9781500254049
ISBN-10: 1500254045
Author: U.S. Army Command and General Staff College
Publication date: 2014
Publisher: CreateSpace Independent Publishing Platform
Format: Paperback 94 pages
FREE US shipping

Book details

ISBN-13: 9781500254049
ISBN-10: 1500254045
Author: U.S. Army Command and General Staff College
Publication date: 2014
Publisher: CreateSpace Independent Publishing Platform
Format: Paperback 94 pages

Summary

Cyber Warfare: China's Strategy to Dominate in Cyber Space (Computer Hacking and Security) (ISBN-13: 9781500254049 and ISBN-10: 1500254045), written by authors U.S. Army Command and General Staff College, was published by CreateSpace Independent Publishing Platform in 2014. With an overall rating of 4.5 stars, it's a notable title among other books. You can easily purchase or rent Cyber Warfare: China's Strategy to Dominate in Cyber Space (Computer Hacking and Security) (Paperback) from BooksRun, along with many other new and used books and textbooks. And, if you're looking to sell your copy, our current buyback offer is $0.02.

Description

China‘s INEW doctrine combining network attack with electronic warfare supports the use of cyber warfare in future conflict. The IW militia unit organization provides each Chinese military region commander with unique network attack, exploitation, and defense capabilities. IW unit training focuses on improving network attack skills during military exercises. The integration of the IW militia units with commercial technology companies provides infrastructure and technical support enabling the units to conduct operations. The IW units gather intelligence on an adversary‘s networks identifying critical nodes and security weaknesses. Armed with this intelligence, theseunits are capable of conducting network attack to disrupt or destroy the identified critical nodes of an enemy‘s C4ISR assets allowing China to use military force in a local war. In an effort to regain its former status, China pursues the strategic goal of reunification of its claimed sovereign territories and lands using economic influence as the primary means but will resort to military force if necessary. Recent cyber activities attributed to China suggest that network exploitation is currently underway and providing military, political, and economic information to the CCP. Domestically and internationally, China views Taiwan and the United States respectively as the major threats to the CCP.

Rate this book Rate this book

We would LOVE it if you could help us and other readers by reviewing the book