Show simple item record

dc.contributor.advisorManess, Ryan
dc.contributor.authorPisani, Kate
dc.date.accessioned2020-02-20T01:30:08Z
dc.date.available2020-02-20T01:30:08Z
dc.date.issued12/12/19
dc.identifier.urihttp://hdl.handle.net/10945/64048
dc.description.abstractAs its closest challenger and greatest strategic rival, China poses a significant threat to the national security and global supremacy of the United States. The United States must exploit vulnerabilities across all elements of China’s national power, including cyberspace, to preserve U.S. strategic advantage as the global hegemon. To avoid escalating responses and brinkmanship between the two countries, it is essential to consider the economic, military, political, and technological interdependencies between the two states. China's reliance on and control of cyberspace to promote domestic stability through the social credit system and the Great Firewall, as well as less advanced cyber security protocols and policies, present potential vulnerabilities. This thesis explores the feasibility of U.S. cyber operations, which are a non-kinetic and non-escalatory measure, to exploit these vulnerabilities, promote popular dissent in China, and undermine regime stability essential to China’s rise. Using cyber-kill chain theory and academic research on China’s cybersecurity system, this thesis explains conceptually the vulnerabilities identified by respective case studies of the social credit system and the Great Firewall; identifies targets of opportunity to exploit in tandem with traditional statecraft; and analyzes the respective vulnerability assessments via a heuristic thought experiment.en_US
dc.description.urihttp://archive.org/details/opensesameidenti1094564048
dc.publisherMonterey, CA; Naval Postgraduate Schoolen_US
dc.rightsCopyright is reserved by the copyright owner.en_US
dc.title"OPEN SESAME": IDENTIFYING CHINA'S CYBERSPACE VULNERABILITIESen_US
dc.typeThesisen_US
dc.contributor.secondreaderStevens, Michael R., Jr.
dc.contributor.departmentDefense Analysis (DA)
dc.subject.authorChinaen_US
dc.subject.authorSocial Credit Systemen_US
dc.subject.authorthe Great Firewallen_US
dc.subject.authorcyberspaceen_US
dc.subject.authorcybersecurityen_US
dc.subject.authorcyber kill chain theoryen_US
dc.subject.authoroffensive cyber operationsen_US
dc.subject.authorphishingen_US
dc.subject.authorINTANGen_US
dc.subject.authorKOLen_US
dc.subject.authorinternet evasion programen_US
dc.subject.authorthe Great Cannonen_US
dc.description.serviceLieutenant Commander, Royal Australian Navyen_US
etd.thesisdegree.nameMaster of Science in Information Strategy and Political Warfareen_US
etd.thesisdegree.levelMastersen_US
etd.thesisdegree.disciplineInformation Strategy and Political Warfareen_US
etd.thesisdegree.grantorNaval Postgraduate Schoolen_US
dc.identifier.thesisid32600
dc.description.distributionstatementApproved for public release; distribution is unlimited.


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record