China: strategic cyber espionage for its economy and military defense

  • César Augusto Sanabria Casanova Universidad Nacional Abierta y a Distancia
Keywords: innovation, technology, China, national security

Abstract

Cyberspace is one of the fields that has allowed the advancement of different social, cultural, military, economic, technological and educational factors, evolving the world today at high speeds, creating a new era, the era of the internet of things "IoT", where this great era has allowed the connection and communication worldwide, generating that the information and computer systems both as hardware and software have become one of the most important strategic assets within an organization or state, appearing cybercrime towards state or governmental and private organizations, where cybercriminals can obtain this great strategic asset for profit, which is why we will perform an analysis of how the People's Republic of China is structured and its influence on cyber attacks to different countries.

Downloads

Download data is not yet available.

Author Biography

César Augusto Sanabria Casanova, Universidad Nacional Abierta y a Distancia

Tecnólogo en Análisis y administración de Riesgo, Especialización Técnica en Ciberinteligencia, ESICI; Estudiante de Ingeniería de Sistemas, Universidad Nacional Abierta y a Distancia - UNAD, Colombia.

How to Cite
Sanabria Casanova, C. A. . (2018). China: strategic cyber espionage for its economy and military defense. Perspectives in Intelligence Journal, 10(19), 281–287. https://doi.org/10.47961/2145194X.66

References

Álvarez, A. (2016). Simposio electrónico internacional. Recuperado de: http://www.asiared.com/es/downloads2/16_3-s_ana-sanchez.pdf.

Anthony, S. (2013). EXTREMETECH. Recuperado de: https://www.extremetech.com/computing/159465-chinas-tianhe-2-supercomputer-twice-as-fast-as-does-titan-shocks-the-world-by-arriving-two-years-early.

Arguelles, D. & Nagles, N. (2012). Estrategias para promover procesos de aprendizaje autónomo. 4ª ed., Bogotá D.C., Cundinamarca, Colombia: Universidad EAN.

Castaño, F. F., Garcia, L. L., & Granada, U. d. (s.f.). Cruce de miradas, relaciones e intercambios. Recuperado de: http://www.ugr.es/~feiap/ceiap3/ceiap/capitulos/capitulo50.pdf.

Deloitte (2014). Deloitte Recuperado de: https://www2.deloitte.com/content/dam/Deloitte/mx/Documents/risk/CISO/Ciber_seguridad.pdf.

Gobierno de España, Ministerio de Asuntos exteriores y de Cooperación (2017). China, República Popular (de) China. Oficina de Información Diplomática. Recuperado de: http://www.exteriores.gob.es/documents/fichaspais/china_ficha%20pais.pdf.

Griffith, K. (2017). Dailymail. Recuperado de: http://www.dailymail.co.uk/news/article-4937010/Clues-suggest-China-suspect-massive-Equifax-hack.html.

Berlinger, J. & Perry, J. (2017). CNN Edición Internacional. Recuperado de: http://edition.cnn.com/2017/04/27/asia/china-south-korea-thaad-hack/index.html.

LLinares, F. (2012). El cibercrimen. Fenomenología y criminología de la delincuencia en el ciberespacio. Madrid, España: Marcial Pons.

Móra, D. (2017). IEEE. Instituto Español de Estudios Estratégicos. Recuperado de: http://www.ieee.es/en/Galerias/fichero/docs_informativos/2017/DIEEEI01-2017_CyberChina_DRM.pd.

Published
2018-12-20
Section
Technology and development