当前位置:主页 > 经济论文 > 政治经济论文 >

美国网络安全战略及其对中美网络安全关系的影响

发布时间:2018-03-09 09:47

  本文选题:网络安全 切入点:网络空间 出处:《南京大学》2014年硕士论文 论文类型:学位论文


【摘要】:近年来,各国为争夺网络空间主导权与话语权,以便未来在网络空间战场中抢占先机,都纷纷加强对网络安全的研究。美国作为世界第一大信息产业国和信息技术起源国,拥有明显的战略资源优势,在国际网络安全版图中占据主导权。美国的网络空间安全战略经历多次演变,从克林顿政府时期的强调“适度信息安全,深度防御战略”,到布什政府注重“安全优先,先发制人”,再到奥巴马政府的“集体安全,综合威慑”,其演变过程呈现“防守”转向“进攻”的趋势。美国网络安全战略的演变对中美关系具有重要影响,在网络安全领域,两国在经济贸易、意识形态和军事方面存在战略互疑,成为中美关系发展的阻碍,严重影响双方安全认知。为此,本文试图解答以下问题:网络安全的威胁来源是什么?网络安全与传统安全威胁相比,有什么特性?美国网络安全战略的演进历程及其趋势是什么?如何缓解中美网络安全困境,构建中美网络安全战略互信?论文第一章认为计算机病毒、黑客攻击、网络犯罪和网络恐怖主义是网络空间安全威胁的重要来源。与传统安全威胁相比,网络威胁具有自身的特性:非对称性、寻址难、破坏范围广。非对称性表现在网络空间冲突双方行为体的防御和攻击方面,任一行为体都可能具备足够攻击能量,向信息大国发动攻击,并造成严重破坏。网络空间具有天生的易攻难守特性,攻击者处于优势地位而防御者位于劣势;寻址难指的是网络攻击的隐蔽性和匿名性,很难鉴定网络攻击来源和攻击意图,即便查找到攻击源,也会因主权国界的存在难以跨界取证,难以断定真正的幕后组织者;破坏范围广是指计算机网络具有互联互通性,一个地区的计算机网络遭受攻击,极易传播至其他计算机,甚至会蔓延至全国范围内计算机系统。论文第二章分析了美国网络安全战略背景与缘起,指出美国对信息网络高度依赖性,这种依赖衍生而来的脆弱性和敏感性是促成美国政府制定网络空间安全战略的背景。美国已经将网络安全看成是其国家安全和经济发展所面临最严重的挑战之一。经济方面,美国每年因网络安全问题损失高达数百亿美元。网络黑客利用银行、金融系统漏洞,窃取客户数据资料。军事方面,美军在中东的军事基地信息系统已经遭到入侵。论文接着介绍了美国历届政府国家网络安全战略。克林顿政府侧重对网络关键基础设施的保护,采用多层次、纵深的深度防御战略,在加强信息安全的同时,侧重推进信息产业发展和资源的优化配置。布什政府时期,再次强化对网络关键基础设施的防护,从发展优先转向安全优先战略,采取“先发制人”策略,加大网络恐怖主义打击。奥巴马执政后,重申了信息技术是美国经济繁荣、科学研究、军事技术、透明政府和自由社会的保障,在信息安全领域采取网络威慑战略,主动出击,方案更具明显攻击性。美国的网络安全战略演进趋势由原有的以防御为主的保守战略转为更为激进的进攻战略。论文第三部分描述了中美网络安全关系方面的现状,指出两国存在战略互疑和不信任感,双方网络安全冲突不仅仅是技术问题,而是更为深刻的经济和政治议题,网络安全争端已经波及到双边经济贸易、人权外交等领域。本章接下来重点分析了如何缓解中美网络安全困境,构建中美网络安全治理。首先是需要在合作共赢的新型大国关系框架内协调网络安全合作模式,共同应对全球性的网络安全调整,中美在网络安全领域的复合相互依赖态势符合两国的共同利益。其次,构建中美两国网络安全治理的两个重要方面在于,既需要通过协商网络行为规则,最大限度地缔造大国间的和谐关系,又必须通过大国履行共同国际责任,最大限度地化解国际冲突与危机。第三,建立中美网络空间战略互信,必须要构建共同利益,摒弃零和思维,尊重双方的政治制度和价值观,摒弃冷战思维。不能以牺牲对方利益为代价来实现自我利益,应客观的看待对方政治经济发展所取得的成就,尊重双方不同的发展道路,共同维护国际社会稳定和网络空间安全。
[Abstract]:In recent years, countries compete for dominance in cyberspace and the right to speak, so in the future in the network space in the battlefield to seize the initiative, have to strengthen the research on network security. The United States as the world's largest information industry and information technology in the country of origin, has the advantages of obvious strategic resources, the dominant power in the international network security domain. Cyberspace Security Strategy of the United States experienced several evolution, from the Clinton administration's emphasis on "appropriate information security defense in depth strategy", the Bush administration to focus on "safety first, pre emptive" to the Obama administration's "collective security, comprehensive deterrence", its evolution process showed "defense" to "attack" trend the evolution of network security strategy. The United States has an important impact on Sino US relations, in the field of network security, the two countries in economic and trade, ideology and military aspects of the existence of strategic interaction The suspect, become obstacles to the development of Sino US relations, seriously affecting their safety awareness. Therefore, this paper tries to answer the following questions: what is the network security threat source network security? Compared with traditional security threats, what are the characteristics? What is the evolution and trend of American security strategy? How to ease Sino US network security dilemma, construction of Sino US network security strategy trust? The first chapter of this thesis that computer viruses, hacker attacks, cyber crime and cyber terrorism is an important source of network security threats. Compared with the traditional security threats, cyber threats has its own characteristics: non symmetry, addressing difficult, destruction of a wide range. The asymmetry in both network space conflict behavior the defense and attack, any behavior may have enough energy to attack, to attack the information power, and cause serious damage. Cyberspace inherently easy to attack and hard to defend, the attacker is in a dominant position and defense in addressing weaknesses; difficult to refer to the confidentiality and anonymity of network attacks, it is difficult to identify the source of network attacks and attack intention, even to find the source of the attack, but also because of the existence of sovereign borders to cross-border evidence, it is difficult to judge really behind the organizers; wide range damage refers to the computer network interconnection, a regional computer network attack, easily spread to other computers, and even spread to the country within the scope of the computer system. The second chapter analyzes the background of American network security strategy and the origin, pointed out that the United States highly dependent on information network this dependence, derived fragility and sensitivity to the U.S. government is to facilitate network space security strategy background. The United States has as its network security One of the most serious challenges facing the national security and economic development. The economy, the United States each year due to loss of network security problem of tens of billions of dollars. Hackers use bank financial system vulnerabilities to steal customer data. The military, the U.S. military base in the middle of the information system has been hacked. Then the thesis introduces the previous U.S. the national cyber security strategy. The Clinton administration focused on protection of key network infrastructure, multi-level, deep depth defense strategy, to strengthen information security at the same time, focus on optimizing the allocation of resources and promote the development of information industry. The Bush administration, once again strengthen the protection to the network critical infrastructure, from the development priority to safety priority strategy, take the "preemptive strike" strategy, increase the network to combat terrorism. The Obama administration, reiterated that the information technology is the United States Economic prosperity, scientific research, military technology, transparent government and free social security in the field of information security, take the network deterrence strategy, take the initiative to plan more obvious aggression. War network security strategy evolution conservative trend in the United States dominated by the defense to slightly more aggressive offensive strategy in the third. Describes the current situation of Sino US network security relations, pointed out that the two countries have strategic mutual trust and distrust, the two sides conflict of network security is not just technical problems, but more profound economic and political issues, the network security dispute has spread to the bilateral economic and trade, human rights diplomacy and other fields. This chapter focuses on the analysis of how to ease the network security dilemma, construction of Sino US network security management. The first is the need of new power relations in the framework of cooperation and win-win coordination in network security cooperation mode, Co With the response to the adjustment of the global network security, Sino US common interests in the field of network security complex interdependence situation of both countries. Secondly, two important aspects of the construction of Sino US network security management is not only need to negotiate the network behavior rules, maximize and create harmonious relations between powers, and the country must fulfill the common international to maximize the responsibility, to resolve international conflicts and crisis. Third, the establishment of Sino US network space must build strategic mutual trust, common interests, abandon the zero sum thinking, with respect to both political system and values, abandon the Cold War mentality. Not for the price to achieve self interests at the expense of the interests of the other party, should objectively view each other in political and economic development the achievements with respect to both the different development path, jointly safeguard the social stability and security in cyberspace.

【学位授予单位】:南京大学
【学位级别】:硕士
【学位授予年份】:2014
【分类号】:TP393.08;D822.371.2

【共引文献】

相关期刊论文 前10条

1 张丽;;经济转轨研究的国际政治经济学视角[J];当代经济研究;2010年09期

2 王学军;;西方国际关系理论范式下的国家安全研究[J];当代亚太;2007年09期

3 柳思思;;从规范进化到规范退化[J];当代亚太;2010年03期

4 林民旺;朱立群;;国际规范的国内化:国内结构的影响及传播机制[J];当代亚太;2011年01期

5 李海龙;;一个综合视角下的国际制度化动力分析[J];东南亚纵横;2010年01期

6 李洋;;国际机制理论视角下的CAFTA建设[J];东南亚南亚研究;2012年01期

7 刘美武;;理性主义与国家安全[J];福建论坛(社科教育版);2011年10期

8 崔雨川;;新自由主义和新现实主义的国际合作观[J];法制与经济(中旬刊);2011年08期

9 赵鹏;;战后美韩关系演变的理论分析[J];法制与社会;2007年02期

10 秦治来;;试论传统建构主义在国际政治学中的异军突起[J];国际关系学院学报;2006年04期

相关博士学位论文 前10条

1 徐婷;全球气候治理中的非正式国际机制研究[D];上海外国语大学;2010年

2 张瑾;主权财富基金国际监管制度法制化研究[D];上海外国语大学;2010年

3 郭秋梅;全球治理视角下的国际迁移组织(IOM)研究[D];暨南大学;2011年

4 麻陆东;东亚地区主义发展路径:过程中的政府间合作[D];华中师范大学;2011年

5 柳思思;历史实践与规范生成[D];外交学院;2011年

6 王金强;国际海底资源分配与美国的政策选择[D];复旦大学;2011年

7 高鹏;朝鲜半岛分裂的进程研究[D];复旦大学;2011年

8 李宝林;信任与遵守:《不扩散核武器条约》无核缔约国的核政策研究[D];复旦大学;2011年

9 花勇;马克思主义国际政治社会学思想研究[D];上海交通大学;2012年

10 李昕;国际组织中的制度变化和制度适应能力[D];上海外国语大学;2011年



本文编号:1588006

资料下载
论文发表

本文链接:https://www.wllwen.com/jingjilunwen/zhengzhijingjixuelunwen/1588006.html


Copyright(c)文论论文网All Rights Reserved | 网站地图 |

版权申明:资料由用户2f34f***提供,本站仅收录摘要或目录,作者需要删除请E-mail邮箱bigeng88@qq.com