[PDF][PDF] Downrange: A Survey of China's Cyber Ranges

D Cary - Center for Security and Emerging Technology …, 2022 - app-us-east-1.t-cdn.net
China is rapidly building cyber ranges that allow cybersecurity teams to test new tools,
practice attack and defense, and evaluate the cybersecurity of a particular product or …

Chinese cyber-attack tools continue to evolve

D Dwyer - Network Security, 2009 - Elsevier
Cyber-attacks from China are on the rise. In September 2008, SecureWorks, a leading
security services provider, published a report citing the locations of the computers from …

[图书][B] Cybersecurity in China: The next wave

G Austin - 2018 - Springer
China has established a global reputation for cyberattack. How good is it at cyber defense?
This book offers a health check, a report card, on China's cybersecurity system in the face of …

Cyber Officials: Chinese Hackers Attack 'Anything and Everything,'

J Rogin - FCW. com, February, 2007 - grc.com
NORFOLK, Va.--At the Naval Network Warfare Command here, US cyber defenders track
and investigate hundreds of suspicious events each day. But the predominant threat comes …

China: Paper Tiger in Cyberspace

AA Oliva… - School of Advanced …, 2012 - apps.dtic.mil
For the last decade, the Peoples Liberation Army PLA has been building its cyber
capabilities and expanding the importance of cyber technology in military operations …

Declawing the dragon: why the US must counter Chinese cyber-warriors

J Muniz - 2009 - apps.dtic.mil
To what extent do the Chinese cyber-warriors--within the Peoples Liberation Army along
with both state and non-state sponsored hackerscrackers--represent a viable threat to both …

Inside the Chinese hack attack

N Thornburgh - TIME. сom, 2005 - courses.cs.washington.edu
Hackers breaking into official US networks are not just using Chinese systems as a launch
pad, but are based in China, sources tell TIME. Their story: Sometime on November 1st …

China's cyber warfare capabilities

D Ball - Security Challenges, 2011 - JSTOR
China has the most extensive and most practised cyber-warfare capabilities in Asia. This
article describes the development of these capabilities since the mid-1990s, the intelligence …

[PDF][PDF] Cyber Threats from China, Russia and Iran: Protecting American Critical Infrastructure

FJ Cilluffo - Testimony before the US House of Representatives …, 2013 - mccrary.auburn.edu
Chairman Meehan, Ranking Member Clarke, and distinguished Members of the
Subcommittee, thank you for this opportunity to testify before you today. The Subcommittee …

[图书][B] The emerging agenda for cybersecurity

P Jennings, T Feakin - 2013 - JSTOR
Cybersecurity is rapidly emerging as a high-priority policy challenge for the Australian
Government. The National Security Strategy released in January 2013 listed 'malicious …