1 Jul 2022

39

Cyber Security and China: The Top 10 Risks

Format: APA

Academic level: University

Paper type: Essay (Any Type)

Words: 1879

Pages: 7

Downloads: 0

Cyberspace is a contentious platform mired by conflicts and struggle for technological power. China’s recent strategies to exert excessive authority over its southern region has negatively affected its relations with the US. This conflict is contributed by the fact that Nasdaq stock market was hacked at a time when the Chinese government was leading tensions in South China sea. Based on this concept, the US government felt that China knew of this attack and never issued warnings. Considering that the attack harmed the US economy, it is evident that a great war between the two states was slowly brewing up. As postulated by the White House’ National Security committee, China's growing technological prowess is posing huge threats to the United States’ economy and military advancements. With the emerging trends in cyberspace, countries have embarked on favoring offensive cyber operations because they are less costly when compared to physical kinetic strikes. It is through this knowledge that various countries have embraced cyber espionage to advance their military and economic supremacy. Therefore, the actions perpetrated by China are affiliated with cyber espionage concepts. It is with this concern that the US government issued orders in 2011 prompting it to retaliate to any cyber espionage threats. Based on these concepts, it is the responsibility of the US government to curb any form of intimidation witnessed in the nation’s cyberspace. Hence, restricting China from asserting its sovereign powers at the southern region is an example of a national interest that the US has over its neighbors. However, it is worth noting that cyber response, enactment of punitive sanctions and military response are some of the limited policies that the US can implement to curb cyberspace menace in South China sea.

Considering the harm caused by the executed cyber-attack, it is prudent to note that a host of national interests are involved. Based on this case scenario, the US government will strive to ensure that China does not exercise its sovereign powers by intimidating its neighbors. With this concern, it is evident that China’s retrogressive practices are a matter of national interest for the US. In response to the cyber threats, Washington did act by aggravating its military navigation operations. In order to promote its national interests, the United States government sent military aircrafts and ships in regions that China claimed to have sovereign powers over ( Buchanan, 2017) . Even though the Chinese government purported to have control of the South China sea, US considered it an open resource for all the neighboring countries to access. Also, the US government executed its national interest in the area by promoting amicable military exercises with the neighboring countries in the region ( Buchanan, 2017) . Based on the espionage threats posed by the cyber attack, it was a matter of national interest for the US to enact possible rules and guidelines dictating behavior in cyberspace. The United States and China are in collaboration on the development of norms in order to achieve common interests in the cyber security domain. However, theft and espionage The United States is concerned about China’s interest in the Western pacific where the country has vested interests in the region. The United States has interests in Sea Power of the East Asian Waters as sees china as threat to its regional aspirations and also global access. Even though China is growing in might, the United Sates is not in a position to relinquish it sea powers which it needs to maintain its stability and influence. History has it that rivalries between established and rising sea powers have the tendency to end badly as in the case of Germany vs Britain in World War I and Japan vs the United States in World War II. The United States and China are in war over the technologies that have been developed to enable the targeting or aircraft carriers and surface ships. In this case, the United States should work on creating a working relationship with China and have the country as an ally instead of an enemy. Through these concerns, the government has implemented various offensive capabilities geared towards deterring individuals from perpetrating cybercrimes. Furthermore, United States has developed its ability to profile and identify foreign hackers which deters neighboring countries from indulging in espionage attacks ( Sanger, 2018). 

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

The United States is seeking to examine its bilateral cyber relations with china because of the rise in cases of cybertheft. Today, China is finding innovative ways to bridge the gap in its core technology and the United States is weary on this practice. With the increase tension between the United States and China, the United States needs to clearly states its policy towards cybersecurity. Over the years, advancements in technology have made it clear that sea power is also power of the sea which can either be achieved by power on the sea or not. Based on the conflict between China and the United States, China is more likely to seek sea power by building up naval capabilities rather than trying to imitate the naval capabilities of the United Sates. In addition to stating its policy on cybersecurity, the United States should also pursue a dissimilar strategy of making its sea power less vulnerable by relying more on drones and smaller elusive strike platforms in order to counter China’s advancements both on the ground and in technological advances. The United States should also pursue on creating a partnership with the East Asian maritime security. This will prompt China to join such a partnership which may provide a leeway for China and the United States to avoid sea-power competition in the East Pacific. On the other hand if china does not wish to join, then the partnership will solidify the United States leadership among its allies in the East Asia region and thus provide both a political and an operating agenda for the American sea power in the western pacific. This will also help the United States launch international efforts with other countries to stop its competition with China. Developing a Cybersecurity policy to be implemented by the international community will not be effective in stopping China’s interest in the East Pacific as the country has some "unwritten” technology rules that can be used against firms in the United States. The tariffs that have been introduced by the United States to China need to be reconsidered as China has introduced a 25 percent levy on American goods for business firms in china. Lastly, Walters (2014), stipulates that through multilateral forums and bilateral agreements, the government can nurture a good rapport with its neighbors which serves to promote peace.

The United States government has a responsibility of revising the policies geared towards curbing crimes in cyberspace. Since countries such as China are using cyber espionage to advance their economy, it is important for the targeted countries to enact measures that cushion them from such malicious practices ( Lieberthal & Singer, 2012) . Considering that China integrates cyber espionage with industrial subsidies, non-tariff bottlenecks and other strategies that damage competition, its economic agenda is evident ( Lieberthal & Singer, 2012) . Also, keeping in mind that cyber espionage is linked with huge financial losses, the US government needs to define its cyberspace regulations strictly. For instance, Germany lost about $ 20 billion through cyber espionage by allowing China to infiltrate its technologies ( Lieberthal & Singer, 2012) . Considering that Germany’s economy is only 20% of that of US, the harm perpetrated by cyber espionage is imaginable ( Lindsay, Cheung & Reveron, 2015) . Also, taking into account that other countries such as Australia, Canada, and South Korea have all been reported to suffer from China's cyber-attacks, why should the US government take a risk? Therefore, with the emerging cases of cyber espionage, the government deserves a right to take part in international forums meant to enact strict laws that are geared towards curbing conflicts in cyberspace.

If the US government is provided with a chance to address this issue, cyber response proves to be an acute option available for the president. In this policy, the government may issue a proportional cyber response which will serve to disrupt critical network operations in China for a short period. For instance, if banking systems are delayed for some time, they may perpetuate an equal amount of loss witnessed by the US in the hacked Nasdaq stock market ( Lindsay, Cheung & Reveron, 2015) . Also, the US government can attack certain targets that are valuable to the Chinese leadership such as the Great Firewall ( Sanger, Barboza & Perlroth, 2013). However, it is worth noting that the US government needs to identify its hackers and take responsibility to show China its technological prowess. Even if the cyberwar goes wild, the US government has the liberty to claim that it was only retaliating to an attack. Furthermore, United States can introduce punitive sanctions towards cyber-attack perpetrators. Some of these practices include barring commercial transactions and freezing the financial resources of the suspects. Considering that President Obama issued orders for the enactment of economic sanctions towards cybercrimes, it would be prudent for the US government to punish the top-level Chinese authorities involved in the saga ( Zhang, 2015). Although it is unlikely that the Chinese government will voluntarily hand the suspects to the US for trial, they can be restricted from traveling and owning any property abroad. Lastly, the president can also implement the principal policy of military response. Increasing the number of US troops in the South China sea will serve to deter China from perpetuating its cyber espionage attacks. Also, this option will serve to warn the Chinese government of indulging in other activities that can harm the US government in any way. In doing so, the US government can also decide to make it clear that its military response was as a result of the cyber-attack witnessed at Nasdaq stock market. This option can compel China’s government to request for bilateral talks with the US to end the existing tensions. Dealing with China in the 21 st century presents some unique challenges to the United States in the formulation of an effective and coherent policy. Today, China is a major player in the global economic and trading system in international organizations. Therefore, the policy options available to the United States are minimal. One of the best ways for the United States to solve the China problem is by striking a global cooperation that is paired with reginal resolve. This option will enable the United States to find a middle ground that would be responsible for safeguarding that conflicting interests that the U.S. has with China. The United States has to seek a balance by accepting China to play a larger global role and then focus on building barriers and coalitions in China. The United States should therefore seek for issues that China could participate on a global level because of its own evolving interests. Such interests include protecting the rights of foreign investors and the protection of intellectual property rights. Therefore, it is best for the United States to have China as an ally and not as an enemy. The U.S. should also restrict access to its markets for the companies that benefit from cyber-espionage that is directed towards U.S. companies.

In conclusion, the emergence of cyber espionage technologies has aggravated the controversy surrounding cyberspace. With these technologies, countries can acquire information illegally for their respective economic gains. With these concerns, it would be prudent for nations to enact strict laws that protect their citizens from malicious practices. Based on the provided case scenario, it is important for the US government to prevent China from exercising its sovereign powers at the south through intimidation. Also, the government must stipulate strict laws geared towards curbing crimes in cyberspace. For instance, the ability of the United States to establish technologies that allow for easy profiling of foreign hackers will serve to deter neighboring countries from indulging in cyber espionage practices. As much as these practices can help to mitigate cybercrimes, the government still has the option of implementing punitive sanctions, military and cyber responses to the entities and nations posing a threat. These strategies can act as a deterrence for cyberspace crimes.

References

Buchanan, B. (2017).  The Cybersecurity Dilemma: Hacking, Trust, and Fear between Nations . Oxford University Press. 

Lieberthal, K., & Singer, P. W. (2012).  Cybersecurity and US-China relations . Brookings. 

Lindsay, J. R., Cheung, T. M., & Reveron, D. S. (Eds.). (2015).  China and cybersecurity: Espionage, strategy, and politics in the digital domain . Oxford University Press, USA. 

Sanger, D. E. (2018). The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age. 

Sanger, D. E., Barboza, D., & Perlroth, N. (2013). Chinese army unit is seen as tied to hacking against US.  New York Times 18

Walters, R. (2014). Cyber-attacks on US companies in 2014.  The Heritage Foundation 4289 , 1-5. 

Zhang, J. (2015). China's new foreign policy under Xi Jinping: towards ‘Peaceful Rise 2.0’?  Global Change, Peace & Security 27 (1), 5-19. 

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 15). Cyber Security and China: The Top 10 Risks.
https://studybounty.com/cyber-security-and-china-essay

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

17 Sep 2023
Sociology

Group Facilitation: Engagement and Authority

PART1 This was a part of the first group therapy session of a group of individuals. The group had both men and women of different backgrounds and personalities. The observation parameters that govern this sort...

Words: 883

Pages: 3

Views: 123

17 Sep 2023
Sociology

Micro Client System

Discussion 1 In my career as a social worker, I have worked with client systems of all sizes. In their career and daily work, social workers interact with all client systems in assisting individuals suffering...

Words: 789

Pages: 3

Views: 177

17 Sep 2023
Sociology

Food Policy and Habits

The survival of human being depends on the food. Globally, food is known to be more than a source of nutrients and energy for human well-being. The food we eat, how we eat, who we eat with, when we eat, and what we...

Words: 382

Pages: 1

Views: 148

17 Sep 2023
Sociology

Culture, Ethnocentrism, and Cultural Relativism

Since the middle Stone Age, human beings are considered as social creatures, from those days people have identified and associated with each other as a community to live and survive. Common behavior and habits unite...

Words: 1321

Pages: 5

Views: 73

17 Sep 2023
Sociology

Client Population and Problem Addressed by the Program

A considerable number of Americans are not consuming the right amount of vegetables and fruits. As of 2013, about 13% of the entire USA population was consuming the required daily intake of fruits (one and a half to...

Words: 1367

Pages: 4

Views: 156

17 Sep 2023
Sociology

Community Observation: How to Get Started

The meeting attended was a legislative meeting of the Board of Directors of the School District of Cheltenham Township. The meeting was held on Tuesday, February 19, 2019, at 7:16p.m in the Administration Building,...

Words: 1513

Pages: 5

Views: 116

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration