PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Asian Cyber Security Standards

Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
The scientific considerations outlined in this article address the threat to the cyber security quality system arising from unclear security standards implemented by China. Over the past few years, the Chinese government has imposed almost 300 new national cyber security standards. These norms cover a variety of information and communication technology (ICT) services as well as products, including software, routers, switches and firewalls. This standardization increases the threat to the cybersecurity quality system, and the more the US places pressure on the western world for Chinese companies investing outside China and on western firms trading in China, the more difficult the situation becomes. The aim of this assessment is to identify these threats, which are also difficulties encountered by Western companies trying to develop their operations in China in order to minimize them. The study was compiled as an analysis of Chinese cybersecurity standardization policy documents and their confrontation with the practice of foreign businesses and as an analysis of international reports and standardization documents on cybersecurity. The theoretical investigative methods used in this paper are: synthesis, analysis, abstraction and generalization.
Czasopismo
Rocznik
Tom
2
Strony
21--32
Opis fizyczny
Bibliogr. 16 poz., rys., tab.
Bibliografia
  • 1. Critical Information Infrastructure Security Protection Regulations, July 2017. http://www.cac.gov.cn/2017-07/11/m_1121294220.htm, transl. by Graham Webster, Paul Triolo and Rogier Creemers http://www.chinacopyrightandmedia.wordpress.com/2017/07/10/critical-information-infrastructure-security-protection-regulations/, 21.06.2020.
  • 2. Ding, J., and Triolo, P., and Sacks, S. (2018), Chinese Interests Take a Big Seat at The AI Governance Table http://www.newamerica.org/cybersecurity-initiative/digichina/blog/chinese-interests-take-big-seat-ai-governance-table/, 21.06.2020.
  • 3. Dou, E.,and King, R. (2016), China Sets New Tone in Drafting Cybersecurity Rules Allows Microsoft, Cisco, other foreigntech companies joint influential Technical Committee 260.https://www.wsj.com/articles/china-moves-to-ease-foreign-concerns-on-cybersecurity-controls-1472132575, 21. 06.2020.
  • 4. Drljevic, N., and Aranda, A., and Stantchev V. (2020), Perspectives on risks and standards that affect the requirements engineering of blockchain technology, Computer Standards&Interfaces, Volume 69, pp. 10-17, DOI: 10.1016/j.csi.2019.103409.
  • 5. ISO/IEC 24759:2017 (E), Security Test Requirements for Cryptographic Modules http://www.sis.se/api/document/preview/921732/, 21.06.2020.
  • 6. Kezhi, Z. (2019) Regulation of network security level protection Ministry of Public Security Material Report (Report No. n49) Beijing: Public Notice of Comments.
  • 7. Keqiang, L. (2019). Highlights of 2019 Government Work Report (Report No. 5.03.19). Beijing: China.org.cn.
  • 8. Kuczabski, M. (2019). Środowisko przywojny stymulowane technologiami – wyzwania i zagrożenia. In R. Bielawski, and J. Solarz, and D. Miszewski (Eds.), Współczesne i przyszłe zagrożenia bezpieczeństwa cz. I (pp. 175-196). Warszawa: Akademia Sztuki Wojennej.
  • 9. Luo, Y. (2017), China Revises Proposals on Regulation of Commercial Encryption. Covington. https: //www.insideprivacy.com/, 21.06.2020.
  • 10. Sacks, S., and Li, M. How Chinese Cybersecurity Standards Impact Doing Business In China. Retrieved from http://www.csis.org/analysis/how-chinese-cybersecurity-standards-impact-doing-business-china/, 21.06.2020.
  • 11. Schuster, S., and Berg, M. and Larrucea X., and Slewe, T., and Kostic, P. (2017). Mass surveillance and technological policy options: Improving security of private communications. Computer Standards&Interfaces, Volume 50, pp. 76-82, DOI: 10.1016/j.csi.2016.09.011.
  • 12. USITC Publication 4199 (amended) November 2010. http://www.usitc.gov/publications/332/pub4199.pdf, 21.06.2020.
  • 13. Xiaomeng, L., and Triolo, P., and Samm, S., and Creemers, R., and Webster, G. Progress, Pauses, and Power Shifts in China’s Cybersecurity Law Regime. http://www.newamerica.org/cyber-security-initiative/digichina/blog/progress-pauses-power-shifts-chinas-cyber-security-law-regime, 21.06.2020.
  • 14. Xiaomeng, L., and Manyi, L., and Sacks S. (2018). CSIS Report: What the Facebook Scandal Means in a Land without Facebook: A Look at China’s Burgeoning Data Protection Regime (Report No. 04.25.2018). Washington: CSIS.
  • 15. Xu, B. (2018). SESEC IV China Cybersecurity Standardization (Report SESEC IV No. 1.2018). Beijing: China Cybersecurity News.
  • 16. Yi Fan, Y.,and Lu, M. C.,and Luo, H.H.,and Sung, Ch. (2017), Standardisation and Trade Barriere Issues Regarding the ICT Market in China: A Study of the Wi-Fi Industry, Journal of Computers, Volume pp. 35-42 DOI:10.3966/199115592017062803004.
Uwagi
PL
Opracowanie rekordu ze środków MNiSW, umowa Nr 461252 w ramach programu "Społeczna odpowiedzialność nauki" - moduł: Popularyzacja nauki i promocja sportu (2021).
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-9c79e5be-460e-47bf-a825-46b23e06d8f7
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.