Yıl: 2018 Cilt: 14 Sayı: 28 Sayfa Aralığı: 1 - 35 Metin Dili: İngilizce İndeks Tarihi: 27-06-2019

Analysis of the Cyber Security Strategies of People’s Republic of China

Öz:
People’s Republic of China (PRC) is the rising power of the international system, considering its large surface area and natural resources, high and efficient population structure, developing economy inclined to technology use, veto power owned in the United Nations’ Security Council, powerful military, and increasing cyber capacity are considered. The PRC has been planning its cyber security strategy within the purposes of enabling economic growth, developing its military capacity, procuring globally newly emerged technologies within cyber espionage operations, and allowing the security and continuation of the current internal system. As a result, the correlation between PRC’s actual cyber security strategies and ancient war concepts, PRC’s laws and regulations, institutional structures, official papers, documents, and plans for cyber security area will be analyzed in this paper. Then, the paper will examine the basic characteristics of the PRC’s cyber security strategy and thus try to establish a perspective on the PRC’s potential cyber security policy in short and medium term.
Anahtar Kelime:

Konular: Siyasi Bilimler Beşeri Bilimler Savunma Bilimleri Uluslararası İlişkiler

Çin Halk Cumhuriyeti’nin Siber Güvenlik Stratejilerinin Analizi

Öz:
Çin Halk Cumhuriyeti (ÇHC) geniş yüzölçümü ve doğal kaynakları, büyük ve verimli nüfus yapısı, teknoloji kullanımına yatkın ve gelişen ekonomisi, Birleşmiş Milletler (BM) Güvenlik Konseyi’nde sahip olduğu veto hakkı, güçlü silahlı kuvvetleri ve artan siber kapasitesi dikkate alındığında uluslararası sistemin yükselen gücü konumundadır. ÇHC genel olarak siber güvenlik stratejisini ekonomik büyümesini sağlamak, askerî kapasitesini geliştirmek, küresel düzeyde yeni gelişen teknolojileri siber espiyonaj operasyonları kapsamında temin etmek ve mevcut iç sisteminin güvenliğini ve devamlılığını sağlamak amaçları kapsamında planlamaktadır. Sahip olduğu büyük nüfus, geniş internet altyapısı ve topluluğu dikkate alındığında, ÇHC’nin siber güvenlik stratejisi kapsamında attığı her adımın bir yandan küresel siber uzay alanını da etkilediği hatırda tutulmalıdır. Bu bağlamda ÇHC’nin siber güvenlik stratejisinin tüm detayları ile irdelenmesi, uluslararası ilişkiler disiplini ve siber uzay çalışmaları açısından önemlidir. Bu makalede öncelikle ÇHC’nin güncel siber güvenlik stratejileri ile kadim savaş konseptleri arasındaki etkileşim, ÇHC’nin siber güvenlik alanı ile ilgili kanun ve düzenlemeleri, kurumsal yapılanmaları, resmî belge, doküman ve planlamaları çalışmada analiz edilecektir. Daha sonra ÇHC’nin siber güvenlik stratejisinin temel özellikleri irdelenecek ve ÇHC’nin kısa ve orta vadede potansiyel siber güvenlik politikası hakkında bir perspektif oluşturulmasına çalışılacaktır.
Anahtar Kelime:

Konular: Siyasi Bilimler Beşeri Bilimler Savunma Bilimleri Uluslararası İlişkiler
Belge Türü: Makale Makale Türü: Araştırma Makalesi Erişim Türü: Erişime Açık
  • DARICILI, Ali Burak, Siber Uzay ve Siber Güvenlik; ABD ve Rusya Federasyonu’nun Siber Güvenlik Stratejilerinin Karşılaştırmalı Analizi, Bursa, Dora Yayıncılık, 2018.
  • TIMOTHY, Thomas L., Three Faces of the Cyber Dragon, Fort Leavenworth, KS, Foreign Military Studies Office, 2012.
  • TZU, Sun, Savaş Sanatı (Translated by Pınar Erturan), İstanbul, Remzi Kitapevi, 2016.
  • ÜNAL, Ahmet Naci, Siber Güvenlik ve Elektronik Bileşenleri, Ankara, Nobel Yayıncılık, 2015. Articles and Book Chapters
  • DARICILI, Ali Burak, “Demokrat Parti Hack Skandalı Bağlamında ABD ve RF’nin Siber Güvenlik Stratejilerinin Analizi”, Journal of International Studies, 1 (1), 2017, pp.1-24.
  • DARICILI, Ali Burak and Barış Özdal, “The Analysis on the Instruments Forming the Cyber Security capacity of Russian Federation”, Bilig, (83), Autumn 2017, pp. 121-146.
  • INKSTER, Nigel, “Chinese Intelligence in the Cyber Age”, Survival: Global Politics and Strategy, 55 (1), 2013, pp. 45-66. Reports
  • CHANSORIA, Monika, Informationising’ Warfare: China Unleashes the Cyber and Space Domain, (Paper by Centre for Land Warfare Studies), http://www.claws.in/images/publication_pdf/ 1270592252MP_20.pdf, (Accession Date: 12.09.2017). China Copyright Media, National Cybersecurity Strategy, https://chinacopyrightandmedia.wordpress.com/2016/12/27/national-cyberspace-security-strategy/ (Accession Date: 14.09.2017).
  • COSTELLA, John, The Strategic Support Force: China’s Information Warfare Service, The Jamestown Foundation, http://www.jamestown.org/ programs/chinabrief/single/?tx_ttnews%5Btt_news%5D=45075&cHash=9758054639ab2cb6bc7868e96736b6cb#.V6RA_Lt95aQ (Accession Date: 17.09.2017).
  • FEAKIN, Tobias, 2013, The Cyber Dragon, (Report by the Australian Strategic Policy Institute, 2013), https://www.aspi.org.au/publications/ special-report-enter-the-cyber-dragon-understanding-chinese-intelli gence-agencies-cyber-capabilities/10_42_31_AM_SR50 _chinese_cyber.pdf (Accession Date: 16.09.2017)
  • GRIFFITH, Samuel B., Communist China’s Capacity to Make War, (Published by the Council on Foreign Affairs), https://www.foreignaffairs.com/articles/asia/1965-01-01/communist-chinas-capacity-make-war (Accession Date: 16.09.2017).
  • KPMG, Overview of China’s Cybersecurity Law, https://assets.kpmg.com/ content/dam/kpmg/cn/pdf/en/2017/02/overview-of-cybersecurity-law.pdf, (Accession Date: 20.09.2017).
  • KREKEL, Bryan, Occupying the Information High Ground: Chinese Capabilities for Computer Network Operations and Cyber Espionage, (Report by Northrop Grumman, http://nsarchive2.gwu.edu//NSAEBB/ NSAEBB424/docs/Cyber-066.pdf (Accession Date: 17.09.2017).
  • LINDSAY, Jon, Chinese Civilian Cybersecurity: Stakeholders, Strategies, and Policy, (Report from Workshops held at the University of California, San Diego April 2012), https://ndc.gov.bd/lib_mgmt/ webroot/earticle/1476/China_and_Cybersecurity.pdf (Accession Date: 16.09.2017).
  • PAGANINI, Pierluigi, China admitted the existence of Information warfare units, http://securityaffairs.co/wordpress/35114/security/ china-admit-cyber-army.html (Accession Date: 16.09.2017).
  • PATTON, Diane E., Evaluating U.S. and Chinese Cyber Security Strategies Within a Cultural Framework, (A Research Report Submitted to the Faculty in Partial Fulfillment of the Graduation Requirements for the Degree of Master of Operational Arts and Sciences), April 2016, http://www.dtic.mil/dtic/tr/fulltext/u2/1031380.pdf (Accession Date: 12.09.2017).
  • QIAO, Liang and XiangsuiWang, 1999, Unrestricted Warfare, (Unofficial translation of the book is available at http://www.c4i.org/unrestricted.pdf), PLA Literature and Arts House.
  • RSAC, Comparative Study: Iran, Russia & PRC Cyber War, https://www.rsaconference.com/writable/presentations/file_upload/hta-w01-comparative-study-iran-russia-prc-cyber-war_copy1.pdf (Accession Date: 15.09.2017).
  • SEGAL, Adam, What to Do About China’s New Cybersecurity Regulations?, https://www.cfr.org/blog/what-do-about-chinas-new-cybersecurity-regulations (Accession Date: 14.09.2017). Standfort, The Great Firewall of China: Background, https://cs.stanford.edu/ people/eroberts/cs181/projects/2010-11/FreedomOfInformationChina/ the-great-firewall-of-china-background/index.html (Accession Date: 20.09.2017).
  • STEVENS, Tim, Breaching Protocol: The Threat of Cyberespionage, Academia.edu, http://www.academia.edu/1158361/Breaching _Protocol_ The_Threat_of_Cyberespionage (Accession Date: 16.09.2017). The NATO Cooperative Cyber Defence Centre of Excellence (NATO CCD COE), China and Cyber Attitudes, Strategies, Organizations, https://ccdcoe.org/sites/default/files/multimedia/pdf/CS_organisation_
  • CHINA_092016.pdf, (Accession Date: 13.09.2017).
  • USNI News, China’s Military Strategy, https://news.usni.org/2015/05/26/ document-chinas-military-strategy, (Accession Date: 14.09.2017).
  • Xinhuanet, International Strategy of Cooperation on Cyberspace, http://news.xinhuanet.com/english/china/2017-03/01/c_136094371.htm (Accession Date: 14.09.2017).
  • Yeni Medya, Çin’in Büyük Güvenlik Duvarı:Sansürde 21 Yıl, https://yenimedya.wordpress.com/tag/buyuk-guvenlik-duvari/ (Accession Date: 21.09.2017).
APA DARICILI A, Özdal B (2018). Analysis of the Cyber Security Strategies of People’s Republic of China. , 1 - 35.
Chicago DARICILI ALI BURAK,Özdal Barış Analysis of the Cyber Security Strategies of People’s Republic of China. (2018): 1 - 35.
MLA DARICILI ALI BURAK,Özdal Barış Analysis of the Cyber Security Strategies of People’s Republic of China. , 2018, ss.1 - 35.
AMA DARICILI A,Özdal B Analysis of the Cyber Security Strategies of People’s Republic of China. . 2018; 1 - 35.
Vancouver DARICILI A,Özdal B Analysis of the Cyber Security Strategies of People’s Republic of China. . 2018; 1 - 35.
IEEE DARICILI A,Özdal B "Analysis of the Cyber Security Strategies of People’s Republic of China." , ss.1 - 35, 2018.
ISNAD DARICILI, ALI BURAK - Özdal, Barış. "Analysis of the Cyber Security Strategies of People’s Republic of China". (2018), 1-35.
APA DARICILI A, Özdal B (2018). Analysis of the Cyber Security Strategies of People’s Republic of China. Güvenlik Stratejileri Dergisi, 14(28), 1 - 35.
Chicago DARICILI ALI BURAK,Özdal Barış Analysis of the Cyber Security Strategies of People’s Republic of China. Güvenlik Stratejileri Dergisi 14, no.28 (2018): 1 - 35.
MLA DARICILI ALI BURAK,Özdal Barış Analysis of the Cyber Security Strategies of People’s Republic of China. Güvenlik Stratejileri Dergisi, vol.14, no.28, 2018, ss.1 - 35.
AMA DARICILI A,Özdal B Analysis of the Cyber Security Strategies of People’s Republic of China. Güvenlik Stratejileri Dergisi. 2018; 14(28): 1 - 35.
Vancouver DARICILI A,Özdal B Analysis of the Cyber Security Strategies of People’s Republic of China. Güvenlik Stratejileri Dergisi. 2018; 14(28): 1 - 35.
IEEE DARICILI A,Özdal B "Analysis of the Cyber Security Strategies of People’s Republic of China." Güvenlik Stratejileri Dergisi, 14, ss.1 - 35, 2018.
ISNAD DARICILI, ALI BURAK - Özdal, Barış. "Analysis of the Cyber Security Strategies of People’s Republic of China". Güvenlik Stratejileri Dergisi 14/28 (2018), 1-35.