. . , .

05.08.2018
284,4 K

. ,

, , , , .

http://www.allbest.ru/

  • 1.
    • 1.1
    • 1.2
    • 1.3
  • 2.
    • 2.1
    • 2.2 ,
      • 2.2.1
      • 2.2.2
  • 3. -
  • , . , XX .
  • , .
  • , , 3 , . - . , . -.
  • , , -, , .
  • China's interest in cyberspace is expressed in the orientation of the Chinese leadership towards the development of innovative technologies in the country, the preservation of sovereignty and the construction of a society of medium prosperity. Chairman of the People's Republic of China Xi Jinping in his speeches repeatedly highlighted that nowadays on the Internet it is important to protect the sovereignty and interests of the country.
  • The main purpose of this work is to fully characterize the Chinese system of control and security in cyberspace within the country, to determine its specificity and China's position in the international cooperation and regulation of cyberspace.
  • The work consists of an introduction, the main part, which includes 3 chapters, and conclusions. First of all, it is necessary to highlight the last Chinese Cybersecurity Law and International Strategy of Cooperation on Cyberspace, which were published in 2017 for a clear understanding of what goals Chinese government tries to achieve. In the first chapter, the Chinese perception and its understanding of cybersecurity must be highlighted. Next, describe the key role of Communist Party of China in national cybersecurity, main governmental and military institutions in charge of realizing Chinese policy in cyberspace. The third chapter is devoted to the basics of national Internet security.
  • Finally, the conclusions of the project will fully represent that in China, unlike other countries, the term cybersecurity is perceived differently, and the country itself is on the way to creating a full-fledged structure for ensuring cybersecurity and Internet control, in which the leading role is played by the CCP, and the creation of a legal basis for cyberspace and the separation of civil and military structures allow to effectively ensure security in the national cyberspace.

- 1990- , . , , , , . , , , Hannes E. Cyber Security. // Oxford Bibliographies in International Relations, New York: Oxford University Press. 2017..

- , . , . -- , . , , , Diakun-Thibault N. Defining Cybersecurity // Technology Innovation Management Review. 2014. . , , .

, , , , , .

- -, . , . , , XXI , , . , , - , .

, , . 2016 . 2016 . . , 200 , 4 . , 1 2017 , , .

, - . 34 , , 2014 83,4%, 527 . 37 2017 96% , - 750 , 90% , 639 2017 Global Status Report on Chinese Phishing Website // China Internet Network Information Center. URL: http://www.cnnic.cn/gjymaqzx/aqzxtjbg/201212/P020121206595720456698.pdf ( : 12.01.2018). 2016 90 - , , 5 (ǿ²閯䓊 ) m nURL: http://www.epochtimes.com/gb/16/5/20/n7915402.htm ( : 09.01.2018).

, . . , XXI , - - .

. - . : , . : , , , , -.

, , , .

. , , XIX 2018 .

, (Sս S ) [ ] URL: http://www.cac.gov.cn/2016-12/27/c_1120195926.htm ( : 10.01.2018), (laS@ ) [ ] URL: http://www.cac.gov.cn/2016-11/07/c_1119867116.htm ( : 18.01.2018), (䍑ʍսI卑ǿ ) [ ] URL: http://www.cac.gov.cn/2017-04/05/c_1120750779.htm ( : 02.03.2018), (ƐMWսٗv ) [ ] URL: http://www.gov.cn/xinwen/2016-07/27/content_5095336.htm, (laM ) [ ] URL: http://www.miit.gov.cn/n1146295/n1146557/n1146619/c4860613/content.html ( : 12.04.2018).

.. . . // . 2013. T. 19. 1. . 169-184. , .. . . : , // .2014. 3. . 64-91. .. . // , 18.07.2012. URL: http://www.belvpo.com/ru/13593.html . . Wang P. Chinese Perception of Cybersecurity // Georgetown Journal of International Affairs. 2012. Pp. 35-40., . , . Lindsay J. China and Cybersecurity: espionage, strategy, and politics in the digital domain // Oxford University Press. 2015. Vol. 9, N 2. Pp. 74-101., . , . Stokes M., Lin J., Hsiao R. The Chinese People's Liberation Army Signals Intelligence and Cyber Reconnaissance Infrastructure. Occasional Paper, Project 2049 Institute.11 November 2011. . Fei G. China's Cybersecurity Challenges and Foreign Policy // Georgetown Journal of International Affairs. 2011. Vol. 3, N 3. Pp. 185-190..

(MERICS), Gierow H. Cyber Security in China: New Political Leadership Focuses on Boosting National Security. MERICS China Monitor. 2014. N 20. .

. . , . -.

1.

1.1

, - . 27 2016 , - .

. , - , , , , . -, : , , , , , , . , , , (Sս S ) [ ] URL: http://www.cac.gov.cn/2016-12/27/c_1120195926.htm ( : 10.01.2018). , , .

, , (Sս S ) [ ] URL: http://www.cac.gov.cn/2016-12/27/c_1120195926.htm ( : 10.01.2018).

, . , , , - .

. , , , , , , , , .

, , , .. , , , , .

, :

: , - , .

: , -.

: , , . , .

: , . , .

: , - , . .

, . : , - , , , .

, , , .

1.2

2014 (. . ƎZM獑㤈SۻǗ@C: Jsunj xnxwanglu guj linwang nqun baoh guanli bnfa), 14 11 2010 (Ɣ閧^?閧I?y@? ) [ ]URL: http://article.chinalawinfo.com:81/article_print.asp?articleid=20933 ( : 15.03.2018).

2014 , . 2015 XII , , .

2016 , . 7 2016 24- 154 1 2017 .

6 , , -. , , , , (laS@ ) [ ] URL: http://www.cac.gov.cn/2016-11/07/c_1119867116.htm ( : 18.01.2018). , , .

, , , , . , .

:

.

.

.

.

.

, .

: - .

31, 43, 46, 63, 76 , : , , 1 (laS@ ) [ ] URL: http://www.cac.gov.cn/2016-11/07/c_1119867116.htm ( : 18.01.2018).

, ..

, - Alibaba Group, Baidu, Tencent Shanda Group . , , , Chinanet.

. . , , , , .

1.3

, 1 2017 - . , , . (. . й, : zhnggu fng'n) - , .

, , (. . a, : hpngC. . Ȩ, : zhuqunC. . , : gngzhC. . , : puhu), . (˼ϰƽ뻥 ) [ ] URL: http://www.epochtimes.com/gb/16/11/14/n8491915.htm ( : 01.03.2018).

- . : , Cybersecurity under Xi JInping: a new model for broad control in China [ ] http://www.digitalcenter.org/columns/cybersecurity-under-xi/ ( : 02.03.2018). , .

. , , (䍑ʍսI卑ǿ ) [ ] URL: http://www.cac.gov.cn/2017-04/05/c_1120750779.htm ( : 02.03.2018). .

, . , . , , Cybersecurity under Xi Jinping: a new model for broad control in China // Center for the Digital Future. 15.01.2018. URL: http://www.digitalcenter.org/columns/cybersecurity-under-xi/ ( : 02.03.2018). , , , . , (䍑ʍսI卑ǿ ) [ ] URL: http://www.cac.gov.cn/2017-04/05/c_1120750779.htm ( : 02.03.2018).

, . , , 2015 . , , , . , .

, - , , , , , . , , .

. ; , . 2016 , . , , , , -, : (ϰƽû츣Һ : ) http://www.xinhuanet.com/politics/2016-04/19/c_1118672059.htm.

, . - , , 8 ( 2016 ) , . .

. , , . .

, :

1. . 10 27 2003 . .

2. - . ( . . ZS, : xioxi jsh nqun), ( . .㤈S, : hlinwang nqun), . , , - .

3. .

4. - . .

5. , , : .

, , , . , - , . , China's Xi calls for better development of Internet // Xinhua, 19.04.2016. URL: http://www.xinhuanet.com/english/2016-04/19/c_135294307.htm ( : 24.01.2018).

2.

, .

1.

: Lindsay, J. China and Cybersecurity: espionage, strategy, and politics in the digital domain. London, Oxford University Press, 2015. P.9

, . : Wang P. Chinese Perception of Cybersecurity // Georgetown Journal of International Affairs. 2012. Pp. 37.. ( ) , ( ), . , .

2.1

XXI 2001 , 1993 . (. . ƐM쵼, : Guji xnxhu lingdao xiaozu). - ( 2003 - ) (M) . (. . aMЭ, : Guji wanglu h xnx n xitio xiaozu), . 2014 (. . @MH, : Guwyun xnxhu gngzu bngngsh).

, 2014 (. . SaM쵼飬: Wanglu nqun h xnxhu lingdao xiaozu).

, - , -, -. , .

. - ( ) 16 . 2018 , Lindsay J. China and Cybersecurity: espionage, strategy, and politics in the digital domain // Oxford University Press. 2015. Vol. 9, N 2.p. 17.:

- : ( , );

- : ( , - );

- : ( , );

- (- );

- ( );

- ( );

- ( , );

- ( , - );

- ( , );

- ( , );

- ( );

- ( );

- ( );

- ( );

- ( , );

- ( );

- ( );

- ( );

- ( );

- ( );

- ( , , , ).

2018 1- 26 3 19 . (. . }SaMԱ, : Zhnggu gngchandang zhngyng wanglu nqun h xnxhu wiyunhu). : , . , , . ( `[͹һĸ﷽' - ) // http://politics.people.com.cn/n1/2018/0321/c1001-29881261.html ( : 03.05.2018). , , .

. , , , . :

- : ( );

- : ( );

- : ( , );

- : (. , - );

- : (. - );

- : (. .

, , , 2013 , , , . , , - .

, , , , , , Gierow H. Cyber Security in China: New Political Leadership Focuses on Boosting National Security. MERICS China Monitor. 2014. N 20. P.35. . . , .

, . , , . , .

2.2. ,

. - () , , .

31 2015 , , c: Lindsay J. China and Cybersecurity: espionage, strategy, and politics in the digital domain // Oxford University Press. 2015. Vol. 9, N 2. P.191..

2.2.1

( / 61195) , , . , () . -, , , . , . .195. .

...

  • : , , , , , , . .

    [1,6 M], 10.06.2015

  • , . , .

    [18,9 K], 01.02.2010

  • , . . " ".

    [4,6 M], 29.10.2012

  • - . . . .

    [24,9 K], 10.12.2014

  • , ( , , , ). .

    [753,4 K], 20.04.2011

  • () - . , - .

    [79,9 K], 19.04.2011

  • , . . .

    [21,1 K], 25.09.2008

  • . . , .

    [29,3 K], 16.11.2012

  • , . () , . , , .

    [377,3 K], 28.02.2011

  • . , , .

    [26,0 K], 30.04.2010

  • . , . . . .

    [1,4 M], 06.03.2012

  • . . - . () .

    [659,3 K], 02.04.2009

  • . .

    [34,2 K], 07.05.2011

  • , , - . .

    [655,0 K], 25.01.2010

  • - , . - . .

    [35,7 K], 23.06.2009

  • . . . , .

    [24,2 K], 16.09.2014

  • . , . .

    [530,6 K], 26.08.2009

  • - . , . -, .

    [30,2 K], 24.10.2010

  • - . . . , .

    [1,4 M], 22.10.2013

  • , . . XXI - . . .

    [42,9 K], 11.01.2014

, , ..
PPT, PPTX PDF- .
.