Traditional Culture Encyclopedia - Traditional virtues - What are the main risks and challenges facing China's cyberspace?

What are the main risks and challenges facing China's cyberspace?

Risks and Challenges Faced

1. Cyberspace key infrastructure and key basic resources are subject to control. As the international Internet originated in the United States, the United States has taken advantage of its pre-eminence to control the key infrastructure and key basic resources of the international Internet, forming a control and deterrence over the development of the Internet in countries around the world. To play a role in the overall control of the Internet operation of the root domain name server, for example, it is like the Internet operation "heart", the U.S. government controls the global 13 root domain name servers in 10.

2, the Internet's key core technologies and core applications of the low level of autonomy and control. Routers, servers, operating systems, databases and application software and other hardware and software is an important factor in the operation and application of the Internet, the relationship between the Internet's operational security and value play.

3. The development of the global network information industry is built on the technical framework defined by the U.S. companies, and the U.S. has formed an unparalleled advantage in this field, providing strong technical support for its expansion and free action in cyberspace. The cyber information industry of other countries such as ours is built on the industrial foundation of the United States, which is as transparent as a glass bottle and as insecure as a skyscraper lacking a foundation.

4, became one of the most important victims of the global network of various types of public harm. The "Snowden incident" exposed the fact that the U.S. government directly used the servers of nine major Internet companies to collect information, and most countries around the world, such as China, Russia, Germany and other countries, have become the victims of the U.S. huge network monitoring program.

5, cyberspace strategic defense and effective deterrence capability is weak. Cyberspace has become the fifth strategy after land, sea, air and sky, and is an inseparable part of the sovereignty of all countries, and the scramble and competition among countries around cyber sovereignty is getting more and more intense. The United States, the United Kingdom, Japan, Germany and many other countries to accelerate the construction of cyberspace combat forces to improve the strategic deterrent capability in cyberspace.