Font Size: a A A

US Information Security Mechanism Research: A Perspective Of Cyber ??Sovereignty

Posted on:2017-06-07Degree:MasterType:Thesis
Country:ChinaCandidate:X C ZhuangFull Text:PDF
GTID:2356330536452813Subject:International politics
Abstract/Summary:PDF Full Text Request
The paper intends to focus on such a topic: How does the U.S.Government cope with information security issues in cyberspace through mechanism construction?The development of Internet has a profound impact on fields of International Politics,economies and military affairs.The United States is the world's largest Internet powerhouse.Since 1960 s,the U.S.Government has started to develop Internet technology.After the end of the Cold War,the U.S.' information industry has developed rapidly,and it makes U.S.government begin to focus on the security in internet-based information in the late 1990 s.Since 2008,U.S.' comprehensive national power has undergone a relative decline,the government values the cooperation with other countries in tackling cyber security.However,U.S.is still seeking cyber domination,and its information security mechanism is transferring from defensive towards both offensive and defensive.If we look back into the development of U.S.' information security policy,we will find that the U.S.' president and other relevant government bodies are all participators in the building of U.S.'information security mechanism.They attach great importance to national security and internet sovereignty.Although U.S.' policy paper does not use the term "Internet Sovereignty",the essence of its information security mechanism is to manage its domestic network independently,and defense against external threats and attacks at the same time.What it practices actually meets the nature of "Internet sovereignty".The U.S.Government safeguards its information security in cyberspace on many levels,including intelligence gathering,threat analysis and so on.Its mechanism construction in information security worth to be discussed,which will provide experiences and lessons for China,and make us better safeguard our Internet Sovereignty.
Keywords/Search Tags:Information Security Mechanism, United States, Internet Sovereignty, National Security
PDF Full Text Request
Related items