Abstract
With the deepening of the new military transformation, cyberspace has become a battlefield without smoke. Network warfare is no longer a matter of talking on paper, but as a new combat style that can not only destroy enemy military command and control, intelligence information, and air defense military network systems, but also can quietly destroy, desecrate or even control the business of the other side. Civil affairs, government affairs, economic and trade, and other civil network systems have achieved the goal of fighting against the enemy without fighting. This paper studies and analyzes the development of the nine classic network warfare applications, and has important practical implications for shaping the safe and favorable cyberspace situation and advancing national cyberspace security.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Arquilla, J., Ronfeldt, D.F.: Cyberwar is coming! Comp. Strategy 12, 141–165 (1993)
The National Defense Strategy of the United States of America, p. 14. March 2005. http://www.dtic/mil/defenselink/2005
Ding, L., Li, B., Li, C.: Characteristics of cyber warfare in the conflict between Russia and Georgia and its enlightenment to China’s cyber warfare preparation. Mil. Commun. Acad. 4, 84 (2011)
Yao, H., Wen, B.: Research on the U.S. Army Cyber Warfare——Discussing U.S. Army Cyber Warfare from the System Engineering Perspective. National Defense University Press, Beijing (2010)
Blueprint for a Secure Cyber Future—the Cybersecurity Strategy for the Homeland Security Enterprise. Homeland Security, November 2011. https://www.dhs.gov/xlibrary/assets/nppd/blueprint-for-a-secure-cyber-future.pdf
Congressional testimony of Vinton Cerf before the House Energy and Commerce Committee. Subcommittee on Communications and Technology, 31 May 2012. http://googlepublicpolicy.blogspot.ca/2012/05/testifying-before-us-house-of.html
Cyber Security: A Crisis of Prioritization. Report to the President, President’s Information Technology Advisory Committee, February 2005. https://www.nitrd.gov/Pitac/reports/20050301_cybersecurity/cybersecurity.pdf
Defending America’s Cyberspace—National Plan for Information Systems Protection Version 1.0: An Invitation to a Dialogue, the White House (2000). https://www.cerias.purdue.edu/assets/pdf/bibtex_archive/bibtex_archive/defending_americas_cyberspace_2000.pdf
Executive Order – Assignment of National Security and Emergency Preparedness Communications Functions, the White House Website, 2 March 2015. https://obamawhitehouse.archives.gov/the-press-office/2012/07/06/executive-order-assignment-national-security-and-emergency-preparedness
Executive Order 13231—Critical Infrastructure Protection in the Information Age, 16 October 2001. https://www.dhs.gov/xlibrary/assets/executive-order-13231-dated-2001-10-16-initial.pdf
Executive Order 13489—Presidential Records, the White House, 10 February 201. https://obamawhitehouse.archives.gov/the-press-office/presidential-records
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Xiang, P., Tianye, X., Zhiting, X., Xuan, G. (2019). The Enlightenment of Nine Classical Cyber Warfare to the National Cyberspace Security Strategy. In: Barolli, L., Leu, FY., Enokido, T., Chen, HC. (eds) Advances on Broadband and Wireless Computing, Communication and Applications. BWCCA 2018. Lecture Notes on Data Engineering and Communications Technologies, vol 25. Springer, Cham. https://doi.org/10.1007/978-3-030-02613-4_62
Download citation
DOI: https://doi.org/10.1007/978-3-030-02613-4_62
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-02612-7
Online ISBN: 978-3-030-02613-4
eBook Packages: EngineeringEngineering (R0)