期刊文献+

信息时代“突发性网络攻击”的安全挑战与应对 被引量:3

Security Challenges and Response Strategies of "Sudden Cyber Attack" in the Information Era
在线阅读 下载PDF
导出
摘要 [目的/意义]网络安全是信息时代国家安全的重要领域。突发性网络攻击是当下网络空间的重要威胁,阐释突发性网络攻击的概念与特征,分析其对国家安全的挑战与应对策略,有利于构筑网络安全屏障,提升国家安全水平。[方法/过程]根据现有文献,阐释突发性网络攻击的内涵与特征,分析其构成要素及其对国家安全的挑战。立足于情报工作,阐释应对突发性网络攻击的策略。[结果/结论]突发性网络攻击具有特定的构成要素。综合实力强的国家是突发性网络攻击的主要受害者,霸权国家也可能通过突发性网络攻击推行网络空间的霸权主义。突发性网络攻击的源头难以侦测,为情报工作带来了诸多困境。因此,可以借鉴协同型网络威胁情报的工作方法,从源头侦测、情报共享平台、协同分析方法、易感性评估等方面推进情报工作转型,以扩大情报源、整合情报力量、提升情报能力、筑牢安全技术屏障。 [Purpose/Significance]Cybersecurity is an important field of national security in the information era.Sudden cyber attack is a vital threat in cyberspace.It is necessary for establishing a barrier of cybersecurity and improving the national security level by explaining the concept and features of sudden cyber attack.[Method/Process]Based on existing literature,this article offers the connotation,features and elements of sudden cyber attack,and analyzes the challenges to national security.Based on the intelligence work,this article also indicates the strategies for responding to sudden cyber attack.[Result/Conclusion]Sudden cyber attack has certain elements.The great power is the main victim of sudden cyber attack,but it can play the role of initiator of sudden cyber attack for pursuing the hegemonism in cyberspace.Also,it is difficult to detect the origin of sudden cyber attack,and sudden cyber attack complicates the current intelligence work as well.Therefore,collaborative cyber threat intelligence can be referred to promote the transformation of intelligence work by source detecting,intelligence sharing platform,collaborative analysis,vulnerability evaluation and upgrade of response technology,aiming to extend intelligence sources,integrate intelligence power,improve intelligence capacity and reinforce security shield.
作者 肖晨卉 Xiao Chenhui(School of Public Administration,Jilin University,Changchun 130012)
出处 《情报杂志》 CSSCI 北大核心 2021年第7期74-79,共6页 Journal of Intelligence
关键词 国家安全 网络安全 网络战争 协同网络威胁情报 突发性网络攻击 national security cybersecurity cyber attack collaborative cyber threat intelligence sudden cyber attack
  • 相关文献

参考文献8

二级参考文献57

  • 1朱锋.“非传统安全”解析[J].中国社会科学,2004(4):139-146. 被引量:132
  • 2尹树强.“安全困境”概念辨析[J].现代国际关系,2003(1):57-61. 被引量:27
  • 3余潇枫,王江丽.非传统安全维护的“边界”、“语境”与“范式”[J].世界经济与政治,2006(11):55-61. 被引量:35
  • 4Robert E.Bedeski. Integration of Non-Traditional Security Issues:a Preliminary Application to South Korea[A].Basingstoke:Macmillan Press Ltd,2000.105.
  • 5陆忠伟.非传统安全论[M]北京:时事出版社,200320.
  • 6王逸舟.重视非传统安全研究[N]人民日报,2003.
  • 7Barry Buzan,Eric Herring. The Arms Dynamic in World Politics[M].Boulder:Lynne Rienner,1998.21.
  • 8Ole W(ae)ver. Securitization and Desecuritization[A].New York:Columbia University Press,1995.46-86.
  • 9[美]汉斯·摩根索:《国家间政治---寻求权力与和平的斗争》[M].肯尼思·汤普森修订,徐昕等译,中国人民公安大学出版社,1990年版,第599页.
  • 10[美]罗伯特·基欧汉、约瑟夫·奈:《权力与相互依赖》(第四版)[M].门洪华译,北京大学出版社,2012年版,第35、53页.

共引文献99

同被引文献29

引证文献3

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部