Dissertation > Excellent graduate degree dissertation topics show

United States since the late 20th century Cyberspace Security Strategy

Author: LiXiaoYan
Tutor: ZhouYongSheng
School: Foreign Service Institute
Course: International relations
Keywords: America cyberspace security information security strategy
CLC: E712
Type: Master's thesis
Year: 2012
Downloads: 484
Quote: 0
Read: Download Dissertation

Abstract


Since the end of the twentieth Century, with the global popularity of the Internet, the network has become the indispensable important infrastructure. At the same time, the development and application of network technology, brought new threats and challenges to the national security -- network security issues have become increasingly prominent. To raise awareness of the importance of network security, to strengthen the network security strategy research crunch time.In this paper, on the base of discussing the concept of information security and network security, In the light of the ambiguous situation for the use of these two concepts, from both the academic circles at home and abroad , at the strategic level, I put forward a new point of view as " Cyberspace Security" should be better. After a time as a clue, from the legislative, judicial, administrative, defense, training five aspects to the United States the main information security management framework, important policies and regulations and the practice, and summed up the United States cyberspace security strategy ’s characteristics in different periods, especially during the Obama’s administration ; through analysis on current International, occurring most new and most important cyberspace security incident, I anylysis both of the offensiveness and vulnerability of the United States CyberSpace Security Strategy. On the base of above,I also forecastthe the development trends of Cyberspace security policy of America. After summing up the enlightenments of American Cyberspace Security Strategy on China , I put forward suggestions to strengthen China’s Cyberspace Security .

Related Dissertations

  1. Research on the Attitude Controller Design and Control Strategy of High Altitude Platform,V249.1
  2. The Research on the Architectural Adumbral Method of Building,TU226
  3. The Research on the Design of Waterfront Open Space of Daowai District in Harbin,TU984.113
  4. Studys in the Contemporary Brand Sales Exhibition Shop Design,TU247
  5. Fuzzy Rhetoric Research of the Literary Language,H05
  6. Secondary art teachers and students, the status of the conflict and control countermeasures,G456
  7. Non - intellectual Factors in the vocational students in mathematics learning,G633.6
  8. The Research of Vector CAD Electronic Drawing Protection System,TP391.72
  9. Study on New Product Launch Strategy in Decathlon,F274
  10. XD upholstered furniture business strategy,F272
  11. The Research on Mixed-age Regional Activities Management of Kindergarten,G617
  12. Study on Cultivation of Speaking Skills of Pre-school Education Teachers,G652.4
  13. Guangzhou City College campus group dance of the popularity to carry out the first set of strategy,G633.96
  14. Investigation and Research about the Interest of Mathematics among the Rural Junior Middle School Students,G633.6
  15. Study on International Development Strategy of Chinese Research Universities,G647
  16. Sun Wah Group study in the power plant DCS industry marketing strategy,F274
  17. Research on Difficulties in Geography Learning for Senior One Students,G633.55
  18. Based on the New Curriculum Reform of High School Geography Teaching Strategy Research,G633.55
  19. The Analysis and Strategy Study about Chemistry Concept Teaching Engagement at the Beginning of High School,G633.8
  20. High School Geography Education Content and Strategies for Disaster Inquiry,G633.55
  21. Comparative Study of Clothing Brand Strategy Based on the Core Competence,F426.86

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > Computer applications > Computer network
© 2012 www.DissertationTopic.Net  Mobile