:::

詳目顯示

回上一頁
題名:美國網路安全防護經驗對我國網路安全情勢之啟示
書刊名:國防雜誌
作者:陳育正
作者(外文):Chen, Yu-cheng
出版日期:2015
卷期:30:3
頁次:頁73-87
主題關鍵詞:網路空間關鍵基礎設施國家安全戰略網路安全資訊安全CyberspaceKey infrastructureNational security strategyCyber securityInformation security
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(1) 博士論文(1) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:1
  • 共同引用共同引用:9
  • 點閱點閱:180
受惠於網路科技進步,各國之間對話、交流、貿易等活動擴大了全球物品的流動。維持國家內部穩定運作的關鍵基礎設施,也連帶提供非常便利的服務,包括電力、水力、交通以及金融體系,而數位化的關鍵基礎設施,成為促進經濟繁榮、強大軍事力量、政府施政透明度的重要基石。然而日益依賴網路的同時,可能因為網路科技產生漏洞,使得國家安全面臨挑戰。美國了解網路安全挑戰,影響層面涵蓋軍事領域、經濟、民生,甚至國際事務等,將網路安全問題視為重要的威脅來源之一。 本文分析美國應對網路安全威脅實踐過程,探討網路安全對於美國的意義,歸納美國目前面臨的網路安全威脅趨勢;另外也體認出美國應對網路安全威脅的防護經驗,計有「邁向組織創新」、「提升政府部門與私人企業合作」,以及「強化情報與反情報工作」等三項;最後強調借鏡美國網路安全防護經驗,進而建立「完善之前瞻性戰略」與建構「安全工作的新穎情境」等作為,有助於提升我國網路安全效能。
Information technology has enhanced international dialogue, exchange and trade and facilitated global flow of goods and services. Key infrastructures which withhold internal stability and operation of country provide convenient services including electricity, water, transportation and financial system. Digitalized infrastructures can promote economic prosperity, strengthen military capability, and enhance the transparency of government. Nevertheless, while the world is increasingly relying on cyberspace, it is likely that loopholes can be generated along with the development of information technology. Thus, key infrastructures can be devastated by cyber attacks and pose great challenges to national security. The US acknowledge the scope of cyberspace challenges which covers the fields of military, economy, livelihood, and even international affairs. The cyber security has also been considered as one of the most serious threats to national security.Through the practicing process for tackling the challenges of cyber security, this article analyzes the implications of cyber security to the US, and generalizes the trend of cyber threats that the US is currently facing. Secondly, it illustrates the experiences of how America protects its cyber security, including innovation of organization, promotion of public-private partnership, and strengthening the efforts of intelligence gathering and counter-intelligence efforts. Finally, it is worth learning the lessons from American's cyber security protection in order to establish a comprehensive and forward-thinking strategy and to build new circumstances for security works. These efforts are able to enhance the efficacy of Taiwan´s security works so national security can be ensured.
期刊論文
1.翁明賢(20100900)。國家安全戰略研究典範的移轉--建構淡江戰略學派之芻議。臺灣國際研究季刊,6(3),65-106。new window  延伸查詢new window
圖書
1.Langevin, James R.、McCaul, Michael T.、Charney, Scott、Raduege, Harry(2008)。Securing Cyberspace for the 44th Presidency。Washington, D.C.:CSIS。  new window
2.(20130312)。Worldwide Threat Assessment of the U.S. Intelligence Community。Office of The Director of National Intelligence。  new window
3.U.S. White House(2010)。National Security Strategy 2010。U.S. White House。  new window
4.U.S. White House(2010)。The Comprehensive National Cybersecurity Initiative。U.S. White House。  new window
5.U.S. Department of Defense(20110714)。Department of Defense Strategy for Operating in Cyberspace。U.S. Department of Defense。  new window
6.U. S. Department of Defense(2005)。The National Defense Strategy of The United States of America。U. S. Department of Defense。  new window
7.U.S. Department of Defense(2010)。Sustaining U.S. Global Leadership: Priorities for 21st Century Defense。U.S. Department of Defense。  new window
8.U.S. Department of Defense(20100816)。Annual Report on Military and Security Developments Involving the People's Republic of China。U.S. Department of Defense。  new window
9.U.S. Department of Defense。Our Mission。U.S. Department of Defense。  new window
10.U.S. Department of Homeland Security(2010)。A Strategy Framework for a Secure Homeland。U.S. Department of Homeland Security。  new window
11.U.S. Department of Homeland Security。About us-US-CERT。U.S. Department of Homeland Security。  new window
12.U.S. Department of Homeland Security。Cyber Storm: Securing Cyber Space。U.S. Department of Homeland Security。  new window
13.U.S. Department of Homeland Security(20141123)。The 2014 Quadrennial Homeland Security Review。U.S. Department of Homeland Security。  new window
14.(2007)。National Counterintelligence Strategy of the United States of America。U.S. Office of The Director of National Intelligence。  new window
15.(2009)。U.S.-China Economic and Security Review Commission 2009。U.S.-China Economic and Security Review Commission。  new window
16.U.S. White House(2003)。The National Strategy to Secure Cyberspace。U.S. White House。  new window
17.黃秋龍(2009)。非傳統安全論與政策應用。結構群文化事業有限公司。  延伸查詢new window
其他
1.(20091030)。網路安全吸引全球目光,http://big5.lanecat.cn/news/20091030.asp。  延伸查詢new window
2.(20140329)。哈格爾訪華前宣布擴編美國網路安全人員,http://www.bbc.co.uk/zhongwen/trad/world/2014/03/140329_us_cyber_defence.shtml?。  延伸查詢new window
3.BBC中文網(20140610)。美報告再指責中國大陸軍方網路間諜活動,http://www.bbc.co.uk/zhongwen/trad/world/2014/06/140610_usa_china_cybersecurity。  延伸查詢new window
4.(20140712)。美司法部指控中國商人竊取美國防技術,http://www.bbc.co.uk/zhongwen/trad/world/2014/07/140712_us_chinese_hacking_defense。  延伸查詢new window
5.何清漣(20130617)。點評中國大陸:史諾登事件的多重效應,http://www.bbc.co.uk/zhongwen/trad/focus_on_china/2013/06/130617_cr_snowden。  延伸查詢new window
6.狄雨霏(20130626)。中國軍事專家痛批稜鏡門,指美國為駭客帝國,http://cn.nytimes.com/world/20130626/c27hack/zh-hant/。  延伸查詢new window
7.連雋偉(20140520)。陸駭客竊密,美國年損逾9兆,http://www.mingpaocanada.com/Tor /htm/News/20140520/taa4.htm?m=0, 。  延伸查詢new window
8.Lewis, James A.(2010)。Cyber War and Competition in the China-U.S. Relationship,http://csis.org/files/publication/100510_CICIR%20Speech.pdf。  new window
9.Merritt, Marian(2010)。Cyber Crime Exposed 2010,http://www.symantec.com/content/en/us/home_homeoffice/media/pdf/norton_cybercrime_exposed_booklet.pdf。  new window
10.Bucci, Steven P.(2009)。A Most Dangerous Link,http://www.usni.org/magazines/proceedings/2009-10/most-dangerous-link。  new window
11.Shipley, Todd G.(2010)。2010 Report on Cyber Crime Investigation,http://www.htcia.org/pdfs/2010survey_report.pdf。  new window
12.Tiezzi, Shannon(20140520)。U.S. Indicts 5 PLA Officers For Hacking, Economic Espionage,http://thediplomat.com/2014/05/us-indicts-5-pla-officers-for-hacking-economicespionage/。  new window
13.Nakashima, Ellen(20090624)。Establishes Cyber-Defense Command,http://www.washingtonpost.com/wp-dyn/content/article/2009/06/23/AR2009062303492.html。  new window
14.蔡裕明(2011)。蓋達組織空中郵包炸彈恐怖攻擊事件評析,http://www.geopolitician.org/index.php?option=com_content&view=article&id=21:2011-01-28-07-37-11&catid=28:2011-01-28-03-29-40&Itemid=27。  new window
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
QR Code
QRCODE