Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword or section
Like this
0Activity
0 of .
Results for:
No results containing your search query
P. 1
China Cyberwar

China Cyberwar

Ratings:

5.0

(1)
|Views: 852 |Likes:
Published by Samvel Martirosyan

More info:

Published by: Samvel Martirosyan on Oct 24, 2009
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

10/24/2012

pdf

text

original

 
Capability of the People’s Republic of China toConduct Cyber Warfare and Computer NetworkExploitation
Prepared forThe US-China Economic and Security Review Commission
Project Manager
Steve DeWeese 703.556.1086 steve.deweese@ngc.com
Principal Author
Bryan Krekel
Subject Matter Experts
George BakosChristopher BarnettNorthrop Grumman CorporationInformation Systems Sector7575 Colshire DriveMcLean, VA 22102October 9, 2009
 
US-China Economic and Security Review CommissionReport on the Capability of the People’s Republic of China toConduct Cyber Warfare and Computer Network Exploitation
2
 
US-China Economic and Security Review CommissionReport on the Capability of the People’s Republic of China toConduct Cyber Warfare and Computer Network Exploitation
3
Table of Contents
Scope Note ................................................................................................ 4
 
Executive Summary ................................................................................... 6
 
Chinese Computer Network Operations Strategy .................................... 10
 
Chinese Computer Network Operations During Conflict .......................... 23
 
Key Entities in Chinese Computer Network Operations ........................... 30
 
Cyber-Espionage ..................................................................................... 51
 
Operational Profile of An Advanced Cyber Intrusion ................................ 59
 
Timeline of Significant Chinese Related Cyber Events 1999-Present ...... 67
 
Chronology of Alleged Chinese Computer Network Exploitation EventsTargeting US and Foreign Networks ........................................................ 68
 
Commonly Used Acronyms ...................................................................... 75
 
Glossary of Technical Terms .................................................................... 76
 
Bibliography ............................................................................................. 82
 

Activity (0)

You've already reviewed this. Edit your review.
1 hundred reads
1 thousand reads
pepemcy liked this
purianjubala liked this
hcwhetzel liked this
Don Cullinane liked this
arvindvarma liked this
Ozrenius liked this
sjcannady1961 liked this
kristalsoldier liked this

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->