Font Size: a A A

An Analysis Of American Network Security Strategy

Posted on:2015-10-27Degree:MasterType:Thesis
Country:ChinaCandidate:X Y FangFull Text:PDF
GTID:2176330422967628Subject:International relations
Abstract/Summary:PDF Full Text Request
The functioning of modern society is inseparable from the network. The network’sstatus and role of the United States, as the country who invented Internet, are bothindispensable and inseparable in all aspects of its political, economic, military,cultural and social life. Therefore, how to keep a stable and secure cyber environment,while maintaining a leading position of network in the world, is an issue that theUnited States-the world’s only superpower-has been always thinking about. With thefermentation of former U.S. National Security Agency employee Snowden events,and the scandal’s widespread that the United State has been monitoring all countries,including its allies, people got a deeper understanding of network security issues. Itcan be said that cyber security problem is accompanied by the development of theInternet and its development has infiltrated every aspect of modern society. Networksecurity vulnerability also means fragile national security. Consequently, to establish anetwork security strategy becomes a necessary step to improve national security. Withthe Internet emerging, successive U.S. administrations are valued in authority andorder of the fifth space, and gradually establish, adjust and develop their networksecurity strategy.This paper starts from the network security issues the United States is facing, and thenbrings out four pair relationships between the Internet characters and network securityissues: interconnection—difficult to cut off, anonymous—hard to trace source,decentralized—difficult to manage, and uncertain boundaries—rebounding hurt sincecyberspace is a virtual and new domain. Based on that, this paper reviews the U.S.cybersecurity strategy development process, summarizes its characteristics, andanalyzes the achievement and challenges in the hope of providing a perspective ofnetwork security strategy for deeper understanding.
Keywords/Search Tags:United States, Cyber Security, Security strategy
PDF Full Text Request
Related items