共查询到19条相似文献,搜索用时 31 毫秒
1.
当前,网络安全问题日益成为世界政治、外交、经济以及军事等领域的重要课题.美国从克林顿政府起,逐步提高了对网络空间存在安全隐患问题的重视程度,制定了一套相对完善和成熟的网络安全政策和法律法规,形成了独具特色的网络安全战略.美国利用网络空间技术和资源优势,采用攻守兼备、恩威并重的方式加强其网络空间安全,并利用网络空间安全政策为其国家利益服务.文章从网络安全力量体系建设、网络空间作战能力建设、推销美国式网络安全政策、利用互联网干涉别国内政等方面对美国网络安全战略的实质进行了剖析. 相似文献
2.
3.
网络安全不仅关乎个人网络安全,更关乎到国家安全,网络安全教育日益成为保护国家安全、促进经济繁荣以及赢得国际竞争的重要手段。研究通过对美国三份网络安全教育战略计划的文本分析,发现美国网络安全教育呈现出由综合统筹到重点部署,再到细化完善的演进趋势,并展现出重视战略顶层设计、采取以人才培养为核心的多样化教育举措、开发推广标准化的人力资源发展支持体系的特征,为此研究提出应该从制定出台周期性的专项教育政策、推动形成网络安全产学研用联盟、缩小群体间、地区间网络安全机会与资源获取差距等方面来促进我国网络安全教育。 相似文献
4.
5.
中央军委十分重视军队的武器装备建设,要求相关部门尽快建立和完善适应武器发展需求和社会主义市场经济体制的竞争机制、评价机制、监督机制和激励机制。在研究探索“四个机制”的过程中、借鉴发达工业国家尤其是美国的经验是极为有益的。 相似文献
6.
7.
LIU Yangyue 《国防科技》2018,39(1):070-075
由于网络技术的军民两用特性,军民融合是提升网络空间安全能力的必然选择。而网络空间的竞争,归根结底是人才竞争。网络安全人才战略必须有效应对人才资源整体不足的现实困难,通过合理配置资源和创建创新机制安排,推进军民融合式的网络安全人才体系建设。美国高度重视人才在网络安全战略体系中的关键作用,通过宏观政策引导、创新交流机制、拓宽吸纳渠道等多种方式,为构建军民融合式的网络安全人才战略提供了经验借鉴。 相似文献
8.
美国国防部副部长威廉·林恩在《外交》季刊发表文章提出,国防部网络安全战略,依赖于美国在商业领域的信息技术产业仍然是世界领袖。信息技术产业基础供应链的风险是非常真实的,为确保美国网络安全,国防部实施新的五大支柱战略,包括:确认网络空间作为战争的新领域;确保积极保护关键基础设施的防御能力; 相似文献
9.
美国太空网络融合问题发源自科技自然发展和美国战略运筹的交会,是美国强化新域新质作战力量的新探索。通过对美国太空网络融合的概念实质、推动因素、效果影响进行阐述,得到如下结论:未来美国太空网络融合将给世界带来军事与安全、经济与商业的全维联动冲击,给国际太空安全带来新的危机与挑战。面对这样的形势,中国应该注重威胁判断、顶层布局以及太空网络融合的军事、商业和技术运作,并在新情境下的国际太空安全治理中承担大国责任,贡献中国力量。 相似文献
10.
11.
美国危机管理对我国的启示 总被引:4,自引:0,他引:4
王强 《中国人民武装警察部队学院学报》2005,21(4):88-90
美国是世界上危机处理经验十分丰富的国家,我国应当借鉴美国的危机管理机构、管理机制和管理经验,建立一套适应我国国情的、行之有效的危机管理机制。 相似文献
12.
Matthew M. Aid 《战略研究杂志》2013,36(4):575-605
This paper demonstrates that US–Scandinavian intelligence relations in general, and Signals Intelligence (Sigint) relations in particular, during the period 1945 through 1960 were more extensive and complicated than had previously been believed. Bilateral US intelligence liaison relations with nominally neutral Sweden were of particular importance in the early years of the Cold War given its geographic location adjacent to the northwestern portion of the USSR. Moreover, the importance of Sigint received from the three principal Scandinavian countries covered by this paper (Norway, Denmark, and Sweden) proved to be quite important to the US intelligence community during the early years of the Cold War, when the US Sigint infrastructure was relatively weak and stretched thin by commitments in Asia and elsewhere. This paper covers the quantity, quality, and types of intelligence information provided to the US by each of the Scandinavian nations, demonstrating that the nature of US intelligence relations with these countries changed substantially as time went by. 相似文献
13.
网络空间越来越被世界各国公认为是继陆地、海洋、空中和太空之后的第五个作战域,为获得和保持像其它作战域那样世界领先的军事优势,美国正在大力进行网络空间作战能力建设。提出了美国网络空间作战能力建设框架,从战略规划、作战力量、作战理论、作战训练、武器装备、战场基础环境、人才培养和作战联盟八个方面全面总结了美国近年来在网络空间作战能力建设方面的主要做法。 相似文献
14.
15.
Narushige Michishita 《战略研究杂志》2013,36(6):1015-1040
Since 1993 North Korea's response to US ‘hegemony’ has been a seemingly paradoxical attempt to bandwagon with the United States by means of military coercion. However, after more than a decade of effort, North Korea has failed to normalize its relations with the United States. In the years ahead, it can either pursue more proactively the strategy of bandwagoning with the United States, shift its strategic focus to China, or embark upon a policy of equidistance between the United States and Japan on the one hand and China on the other. 相似文献
16.
Jonathan B. Tucker 《The Nonproliferation Review》2013,20(3):363-384
In 2003, Libyan leader Muammar Qaddafi agreed to eliminate his country's weapons of mass destruction (WMD) programs and long-range Scud missiles under strict verification by U.S. and British experts and international inspectors. This article examines the negotiation and implementation of Libya's WMD rollback, with a primary focus on its chemical weapons program, and draws some lessons for the future. Although the Libyan case was unique in many ways, some aspects have relevance for other countries, including the critical role played by multilateral nonproliferation organizations, the utility of economic sanctions and export controls, the importance of a flexible U.S. disarmament funding mechanism, the value of rotating technical assistance teams in and out of the country that is disarming, and the desirability of remaining politically engaged with a former proliferator after rollback is complete. 相似文献
17.
Christine Sixta Rinehart 《Defense & Security Analysis》2017,33(1):45-56
The United States’ Air Force (USAF) has developed and used unmanned aerial vehicle (UAV) technology to monitor and assassinate dangerous terrorists in Afghanistan, Iraq, Libya, Pakistan, Somalia, Syria, and Yemen. Currently, there are few countries that possess armed UAV and since the US created much of this technology, the USAF is usually part of the training that automatically accompanies the purchase of its UAVs. The research question this article attempts to answer is, “What is the extent of the United States’ Air Force assistance in the training and proliferation of UAV technology to foreign militaries?” 相似文献
18.
Loch K. Johnson ? 《The Nonproliferation Review》2013,20(1):111-118
Spying on the Nuclear Bear: Anglo-American Intelligence and the Soviet Bomb, by Michael S. Goodman. Stanford University Press, 2007. 295 pages, $50. 相似文献
19.
2012年1月5日,美国国防部发表了《保持美国的全球领导地位:21世纪的防务重点计划报告》,在"重返亚太"战略的战略背景下,重点针对美国未来的军事力量结构、全球部署态势、军事战略目标等进行了重新规划。新军事战略调整对整个国际格局和地区性大国产生深远影响。随着美国重返亚太的战略调整,军事上的相互依赖程度体现在美日同盟之间尤为突出。本文仅从军事战略角度,运用《权力与相互依赖》中部分理论对其调整下的美日军事同盟机制进行分析。 相似文献