共查询到20条相似文献,搜索用时 125 毫秒
1.
2.
网络空间已成为大国博弈新焦点,军民融合发展是我国一项基本国策.加快推进网络空间军民融合深度发展,事关维护国家经济社会网络安全大局和提升我军基于网络信息体系作战能力.要牢固树立军民融合深度发展新理念,尽快构建顺畅高效的军地协调机制,加快发展网络空间新质动员力量,加强网络空间战场建设和武器研发,努力促成全要素、多领域、高效益的融合发展格局,保障网络强军战略目标顺利实现. 相似文献
3.
近年来,美国针对日益严峻的网络空间安全形势,把打造美军网络空间作战能力建设摆上了重要位置,并为此出台了一系列相关政策,着力完善网络空间作战领导指挥体制,组建专门的网络作战力量,加强相关武器装备建设与人才培养,以及对外合作、交流等. 相似文献
4.
5.
6.
7.
运用复杂网络理论的基本原理对空间信息支援力量体系结构的同步能力进行了研究,构建了空间信息支援力量体系结构的网络拓扑模型,给出了网络同步判定依据,分析了初始连接机制、通信节点数以及总节点数的变化对空间信息支援力量体系结构整体同步能力的影响,为空间信息支援力量体系论证和作用发挥等问题的深入研究提供了借鉴和参考. 相似文献
8.
空间力量信息支援能力量化分析 总被引:1,自引:0,他引:1
研究空间力量的信息支援能力,对于搞好航天装备体系建设的顶层设计、规划论证以及作战运用,具有重要的现实意义和军事效益.对空间力量与空间信息支援作战、空间力量的作战任务、空间力量的信息支援能力等问题进行了定性分析.在对传统ADC方法进行合理改进的基础上,基于环境影响因子、各性能指标的权重以及各性能指标的评价函数,提出了一种全过程评估能力指标的新思路、新方法,建立了空间力量信息支援能力评估模型,为量化分析空间力量信息支援能力提供了一定的依据. 相似文献
9.
信息网络监控日益成为国家情报的重要来源。从情报工作改革、信息网络开放、网络信息内容和情报处理能力四个方面分析信息网络监控成为重要情报来源的客观原因,阐述世界主要国家开展信息网络监控的基本情况,并分析了其对我国信息安全的挑战。研究表明,面对境外信息网络监控,我国应坚持"和平、安全、开放、共享"原则,积极推动国际网络空间行为规范的制定,不断完善网络空间力量体系,加速由网络大国迈向网络强国。 相似文献
10.
当前,网络安全问题日益成为世界政治、外交、经济以及军事等领域的重要课题.美国从克林顿政府起,逐步提高了对网络空间存在安全隐患问题的重视程度,制定了一套相对完善和成熟的网络安全政策和法律法规,形成了独具特色的网络安全战略.美国利用网络空间技术和资源优势,采用攻守兼备、恩威并重的方式加强其网络空间安全,并利用网络空间安全政策为其国家利益服务.文章从网络安全力量体系建设、网络空间作战能力建设、推销美国式网络安全政策、利用互联网干涉别国内政等方面对美国网络安全战略的实质进行了剖析. 相似文献
11.
LIU Yangyue 《国防科技》2018,39(1):070-075
由于网络技术的军民两用特性,军民融合是提升网络空间安全能力的必然选择。而网络空间的竞争,归根结底是人才竞争。网络安全人才战略必须有效应对人才资源整体不足的现实困难,通过合理配置资源和创建创新机制安排,推进军民融合式的网络安全人才体系建设。美国高度重视人才在网络安全战略体系中的关键作用,通过宏观政策引导、创新交流机制、拓宽吸纳渠道等多种方式,为构建军民融合式的网络安全人才战略提供了经验借鉴。 相似文献
12.
Forrest B. Hare 《Contemporary Security Policy》2019,40(2):193-213
Given the advances made in conventional weapon capabilities, precision should by now be the accepted and expected norm in cyberspace as well. In this article I argue that developing precision cyber weapon systems, to be used during a lawful conflict, can be an important part of a responsible national security strategy to reduce the amount of violence and physical destruction in conflicts. I first describe a precision cyber weapon system in a military context. I then present three compelling rationales for the development of precision cyber weapon systems based on ethical, operational, and financial considerations. To support the position, I address several arguments that have been levied against their development. Thereafter I present several recommendations for a way ahead. 相似文献
13.
14.
震网病毒被认为是史上第一种"网络物理战"武器,文章介绍了两个版本震网病毒的作用机理,分析了网络物理战的作战思想,提出了层次化的网络空间、过程中的网络漏洞和网络物理威慑等新概念,并总结了其对网络战研究的启示。 相似文献
15.
Max Smeets 《战略研究杂志》2018,41(1-2):6-32
This article examines the transitory nature of cyberweapons. Shedding light on this highly understudied facet is important both for grasping how cyberspace affects international security and policymakers’ efforts to make accurate decisions regarding the deployment of cyberweapons. First, laying out the life cycle of a cyberweapon, I argue that these offensive capabilities are both different in ‘degree’ and in ‘kind’ compared with other regarding their temporary ability to cause harm or damage. Second, I develop six propositions which indicate that not only technical features, inherent to the different types of cyber capabilities – that is, the type of exploited vulnerability, access and payload – but also offender and defender characteristics explain differences in transitoriness between cyberweapons. Finally, drawing out the implications, I reveal that the transitory nature of cyberweapons benefits great powers, changes the incentive structure for offensive cyber cooperation and induces a different funding structure for (military) cyber programs compared with conventional weapon programs. I also note that the time-dependent dynamic underlying cyberweapons potentially explains the limited deployment of cyberweapons compared to espionage capabilities. 相似文献
16.
Gary McGraw 《战略研究杂志》2013,36(1):109-119
The information systems controlling our critical infrastructure are vulnerable to cyber attack. Cyber war is therefore inevitable unless we improve our cyber defenses. The only way to do this is by building security into systems at the design stage. 相似文献
17.
近几年美军针对网络电磁空间不断出台新的政策和联合条令,但是相关规定在网络空间作战、电子战、频谱管理行动的定义上有交叠,为了进一步提高作战能力,防止冲突的发生,美军提出网络电磁行动的概念对三者进行整合,针对美军提出的网络电磁行动进行了介绍和分析并提出了对我国的一些启示。 相似文献
18.
Erin D. Dumbacher 《The Nonproliferation Review》2013,20(3-4):203-222
ABSTRACTAn arms race in cyberspace is underway. US and Western government efforts to control this process have largely been limited to deterrence and norm development. This article examines an alternative policy option: arms control. To gauge whether arms-control models offer useful lessons for addressing cyber capabilities, this article compiles a new dataset of predominantly twentieth-century arms-control agreements. It also evaluates two case studies of negotiated agreements that regulate dual-use technologies, the 1928 Geneva Protocol prohibiting chemical- and biological-weapon use and the 1944 Chicago Convention on International Civil Aviation. The analysis underscores the limits of norm development for emerging technologies with both civilian and military applications. It finds lessons for developing verifiable, international cooperation mechanisms for cyberwarfare in the regulatory model of international aviation. Conventionally, arms-control agreements take advantage of transparent tests or estimates of arms. To restrict cyberwarfare activities, experts and policy makers must adapt arms-control models to a difficult-to-measure technology at an advanced stage of development and use. Further investigation of international regulatory schemes for dual-use technology of similar diffusion and development to the internet, such as international civil aviation, is needed. 相似文献
19.
随着网络中心战的发展,信息安全问题在现代潜艇系统中的重要性日益凸显。首先分析潜艇信息安全问题的背景、总结其研究现状,然后研究了潜艇信息安全需求及属性定义,探讨了潜艇信息系统信息安全防护整体框架,在此基础上提出了一种综合静态安全防护和动态运行安全防护的潜艇信息系统信息安全纵深防护体系结构。以期为解决潜艇系统设计中的安全缺陷、建立潜艇信息安全防护体系,辅助系统维护、保障系统安全提供基础。 相似文献
20.
This article suggests that there is a paradigm crisis in the sub-field of cyber deterrence. Cyber deterrence is evolving slowly and unpromisingly as a strategic tool in both theory and practice, mostly due to the ill-fitting theoretical framework and underlining assumptions it borrows from the absolute-nuclear-deterrence context. Therefore, this article suggests replacing the accepted yet inadequate paradigm of absolute deterrence with a better-fitting restrictive-cumulative-deterrence paradigm that draws on the Israeli approach to deterrence, introducing it into the cyber domain. The article further criticizes the current discourse in the field, including some ‘common knowledge’ (mis)understandings of cyberspace and the ways it affects the possibility of deterrence. 相似文献