The US, Russia, and China Cybersecurity Conflict Essay

Exclusively available on IvyPanda Available only on IvyPanda

Introduction

Cybersecurity is an important aspect of the National Security of every country, no matter its size, wealth, or political orientation. A faulty cybersecurity system can lead to such negative effects as disturbances in the work of critical infrastructure providers, such as food supply and medical provision. Cyber-attacks can also target and disrupt educational institutions, banks, and insurers. Certain measures can be taken to prevent these consequences, and these specifications consider the government and civilian citizens. The major tech companies can influence the nation’s cybersecurity by expanding zero-trust programs, integrating cybersecurity into systems, and providing education and training in internal security awareness.

We will write a custom essay on your topic a custom Essay on The US, Russia, and China Cybersecurity Conflict
808 writers online

The Current Cybersecurity Crisis

The current situation in the space of cybersecurity provides a significant example of how complicated this area of National Security and its influence on foreign politics can be. According to China’s National Computer Network Emergency Response Technical Team/Coordination Center (CNCNERT), since late February, cybersecurity breaches have been detected among Chinese Internet users.1 These breaches were undertaken mainly by people with US Internet addresses in order to target Russia, Ukraine, and Belarus. During the investigation carried out by the Chinese cybersecurity agency, it was found that the attackers were mostly from the United States. Ten of the attackers were identified as being from the state of New York. In addition, the agency detected Internet addresses from Germany and the Netherlands. Eighty-seven of the performed attacks targeted Russian infrastructures.2 Still, more attention and investigations are required to examine the conditions under which attacks are organized.

Cyber-Attacks Examples

For the sake of National Security, the sources of cyber-attacks need to be traced since it essentially makes China the scapegoat in this situation. According to Fang Xingdong, the founder of the technology ChanaLabs, the usage of third-world countries’ devices is not unusual in hacking.3 China can easily become the victim of the attacks due to its great number of computers and ongoing Internet transactions. Another significant piece of information is that since February, cyber-attacks on Ukraine have increased greatly.4 These examples prove that cybersecurity is breached on all levels of the current military conflict.

The offered example can also be a case of an intent coming not from the standpoint of foreign politics but rather from a human civilian perspective. It is possible to say that these attacks were the product of an organization that is not affiliated with any government. Many believe that experts’ participation in the field should not be ignored. Examples of such organizations are Anonymous and Ghost Squad Hackers, who proclaim themselves as hacktivists (using Internet hacking as a form of activism). It is unknown whether the attackers intentionally chose China as their scapegoat to mar its position or whether it was the candidate deemed the most convenient.

Conclusion

Cybersecurity in the current times is in a highly precarious position. The disturbances in cybersecurity lead to faulty work of important infrastructure providers, such as food and medicine, and influence the social disposition of a country. Several nations have been heavily involved in the cyber crisis, including cyber-attacks using devices in third-world countries, such as China and Russia. This, inevitably, makes most international figures, used in this way a scapegoat for these actions. It remains unclear if these threats come from the government or are rooted in a civilian-run activist organization.

Reference

Han, Z., & Siqi, C. (2022). . Global Times.

Footnotes

  1. Han & Siqi, 2022.
  2. Han & Siqi, 2022.
  3. Han & Siqi, 2022.
  4. Han & Siqi, 2022.
Print
Need an custom research paper on The US, Russia, and China Cybersecurity Conflict written from scratch by a professional specifically for you?
808 writers online
Cite This paper
Select a referencing style:

Reference

IvyPanda. (2023, March 21). The US, Russia, and China Cybersecurity Conflict. https://ivypanda.com/essays/the-us-russia-and-china-cybersecurity-conflict/

Work Cited

"The US, Russia, and China Cybersecurity Conflict." IvyPanda, 21 Mar. 2023, ivypanda.com/essays/the-us-russia-and-china-cybersecurity-conflict/.

References

IvyPanda. (2023) 'The US, Russia, and China Cybersecurity Conflict'. 21 March.

References

IvyPanda. 2023. "The US, Russia, and China Cybersecurity Conflict." March 21, 2023. https://ivypanda.com/essays/the-us-russia-and-china-cybersecurity-conflict/.

1. IvyPanda. "The US, Russia, and China Cybersecurity Conflict." March 21, 2023. https://ivypanda.com/essays/the-us-russia-and-china-cybersecurity-conflict/.


Bibliography


IvyPanda. "The US, Russia, and China Cybersecurity Conflict." March 21, 2023. https://ivypanda.com/essays/the-us-russia-and-china-cybersecurity-conflict/.

Powered by CiteTotal, citation style website
If you are the copyright owner of this paper and no longer wish to have your work published on IvyPanda. Request the removal
More related papers
Cite
Print
1 / 1