"OPEN SESAME": IDENTIFYING CHINA'S CYBERSPACE VULNERABILITIES
dc.contributor.advisor | Maness, Ryan | |
dc.contributor.author | Pisani, Kate | |
dc.date.accessioned | 2020-02-20T01:30:08Z | |
dc.date.available | 2020-02-20T01:30:08Z | |
dc.date.issued | 12/12/19 | |
dc.identifier.uri | http://hdl.handle.net/10945/64048 | |
dc.description.abstract | As its closest challenger and greatest strategic rival, China poses a significant threat to the national security and global supremacy of the United States. The United States must exploit vulnerabilities across all elements of China’s national power, including cyberspace, to preserve U.S. strategic advantage as the global hegemon. To avoid escalating responses and brinkmanship between the two countries, it is essential to consider the economic, military, political, and technological interdependencies between the two states. China's reliance on and control of cyberspace to promote domestic stability through the social credit system and the Great Firewall, as well as less advanced cyber security protocols and policies, present potential vulnerabilities. This thesis explores the feasibility of U.S. cyber operations, which are a non-kinetic and non-escalatory measure, to exploit these vulnerabilities, promote popular dissent in China, and undermine regime stability essential to China’s rise. Using cyber-kill chain theory and academic research on China’s cybersecurity system, this thesis explains conceptually the vulnerabilities identified by respective case studies of the social credit system and the Great Firewall; identifies targets of opportunity to exploit in tandem with traditional statecraft; and analyzes the respective vulnerability assessments via a heuristic thought experiment. | en_US |
dc.description.uri | http://archive.org/details/opensesameidenti1094564048 | |
dc.publisher | Monterey, CA; Naval Postgraduate School | en_US |
dc.rights | Copyright is reserved by the copyright owner. | en_US |
dc.title | "OPEN SESAME": IDENTIFYING CHINA'S CYBERSPACE VULNERABILITIES | en_US |
dc.type | Thesis | en_US |
dc.contributor.secondreader | Stevens, Michael R., Jr. | |
dc.contributor.department | Defense Analysis (DA) | |
dc.subject.author | China | en_US |
dc.subject.author | Social Credit System | en_US |
dc.subject.author | the Great Firewall | en_US |
dc.subject.author | cyberspace | en_US |
dc.subject.author | cybersecurity | en_US |
dc.subject.author | cyber kill chain theory | en_US |
dc.subject.author | offensive cyber operations | en_US |
dc.subject.author | phishing | en_US |
dc.subject.author | INTANG | en_US |
dc.subject.author | KOL | en_US |
dc.subject.author | internet evasion program | en_US |
dc.subject.author | the Great Cannon | en_US |
dc.description.service | Lieutenant Commander, Royal Australian Navy | en_US |
etd.thesisdegree.name | Master of Science in Information Strategy and Political Warfare | en_US |
etd.thesisdegree.level | Masters | en_US |
etd.thesisdegree.discipline | Information Strategy and Political Warfare | en_US |
etd.thesisdegree.grantor | Naval Postgraduate School | en_US |
dc.identifier.thesisid | 32600 | |
dc.description.distributionstatement | Approved for public release; distribution is unlimited. |
Files in this item
This item appears in the following Collection(s)
-
1. Thesis and Dissertation Collection, all items
Publicly releasable NPS Theses, Dissertations, MBA Professional Reports, Joint Applied Projects, Systems Engineering Project Reports and other NPS degree-earning written works.