[時事英文] 中美網絡戰鬥力
在過去的二十年中,對常規軍事作戰的理解已從二維戰場(battlefield)轉變為多維系統的作戰空間(battlespace),資訊戰(information warfare)也早已開始。我們今天先透過紐約時報的報導探討傳統資訊戰的定義。
★★★★★★★★★★★★
《2015 紐約時報》報導:
As China president Xi Jinping begins a trip to the United States that could include the first arms control accord for cyberspace between the United States and China, a new RAND report that rates the cyber warfare capabilities of the world’s two largest economies shows how important such an agreement could be. The report, which rates the capabilities of both militaries over the course of two situations, a conflict over Taiwan and one over the Spratly Islands, dedicates an entire chapter to the respective cyber capabilities of both sides.
1. arms control(國與國一致進行的)軍備控制
2. accord (n.) (國家之間的)協議;條約
3. cyberspace 網際空間
4. rate (v.) 評估
5. cyber warfare 網路戰
6. a conflict over ⋯⋯的衝突
7. dedicate 奉獻,獻出(全部精力、時間等)*
8. respective 各自的;分別的
中國國家主席習近平正在對美國進行國事訪問,此行有可能會簽訂中美網路空間的首個軍備控制協議。蘭德公司也在此際發佈報告,對全球兩大經濟體的網路戰能力進行評估,顯示了這樣一個協議有多麼重要。該報告評估了兩軍在兩種局勢下的戰力,一是臺海衝突,二是南沙群島爭端。報告用了整整一章來分析美中各自的網路戰能力。
*dedicate: https://bit.ly/2VNp0NL
★★★★★★★★★★★★
As it maps out the potential conflicts, and in turn the potential ways each country could attack the other’s network, it becomes apparent why a first agreement between President Obama and Mr. Xi might focus on the rules of the road for attacks on core infrastructure instead of on better publicized Chinese attacks aimed at gaining advantages and intellectual property for companies.
In particular, it argues unclassified networks for key infrastructure are more vulnerable than those of the military, and that broad attacks have a huge potential to cause unanticipated escalations. Even so, it says that the United States would probably do better than might be expected given the high-profile media coverage of Chinese cyberattacks.
9. map sth out 詳細安排;籌劃
10. potential conflict 潛在的衝突
11. the rules of the road 使用規則
12. gain advantage 取得優勢
13. intellectual property 智慧財產權
14. have a huge potential 有著巨大的可能性
15. unanticipated escalation 意料之外的逐步升級
16. high-profile 高調;備受關注的
17. cyberattack(由駭客發起的)網路攻擊
報告對潛在的衝突進行了描述,進而又對雙方可能採取哪些方式來攻擊彼此的網路進行了分析,從中可以看到為什麼歐巴馬和習近平簽訂的第一個協議可能會側重在攻擊核心基礎設施的規則上,而不是更為人知的中國為獲得商業優勢和智慧財產權進行的網路攻擊。這份報告特別指出,關鍵基礎設施使用的非機密網路較軍方網路脆弱,而且那樣的廣泛攻擊很有可能導致雙方沒有預計到的衝突升級。即便如此,報告說,鑒於中國的網路攻擊得到了大篇幅的報道,美國在網路戰中的表現可能比人們預期的出色。
★★★★★★★★★★★★
The Chinese military “has been heavily involved in large-scale cyber espionage since the mid-2000s, which has made it the subject of much media attention.
Because the most common targets of these attacks have been lightly defended corporate and unclassified government systems, this activity may have created an exaggerated sense of the capabilities that China might bring to bear in an operational military context,” it concludes. Citing a 2013 document distributed throughout China’s People’s Liberation Army called “The Science of Military Strategy,” the report adds that the Chinese army recognizes the major advantages to being aggressive in cyberwar.
18. cyber espionage 網路間諜活動
19. media attention 媒體關注
20. bring to bear 運用
21. cite 引用
22. throughout (prep.) 遍及
23. China’s People’s Liberation Army 中國人民解放軍
中國軍方「自2000年代中期起,一直在積极參與大規模網路間諜活動,因此成為備受媒體關注的話題。由於這些攻擊最常見的目標是防禦措施較少的企業以及非機密的政府系統,因此對於中國在網路戰方面的能力,可能存在一種誇大,」該報告認為。該報告援引發表於2013年、在中國人民解放軍全軍分發的《戰略學》,稱中國軍方認識到在網路戰中採取攻勢的好處。
★★★★★★★★★★★★
One danger of that, and also more broadly of employing cyberattacks in a situation of escalating conflict, is that of unintentional escalation. Using several hypothetical situations, the report shows how a cyberattack could deepen a conflict. For example, it points out that if China were to make a move for Taiwan, a cyberattack aimed at hurting the potential for the United States to intercede, could contradictorily force the U.S. to come into the conflict. Likewise it argues that in the case of some kind of regional conflict, United States attacks on Chinese infrastructure that in peace-time would be deemed mainly of civilian importance could take on deeper military implications.
24. escalating conflict 逐步升級的衝突
25. unintentional 無意的;非故意的
26. hypothetical 假設的;假定的
27. deepen a conflict 深化衝突
28. point out 指出
29. aim at 瞄準;對準
30. make a move 採取行動
31. intercede 介入;調停
32. contradictorily force 反而迫使
33. regional conflict 區域衝突
34. peace-time 和平時期
35. be deemed 被認為;被視作
36. take on 呈現;開始具有(某種特徵)
37. implication 暗示;牽連
這種思維,以及在不斷升級的衝突中廣泛採用網路攻擊的策略的危險之處在於,它會在無意之中導致衝突升級。該報告假設了幾種情況,來說明網路攻擊將如何令衝突升級。假設中國在臺海採取行動,如果它為了預防美國調停而發起網路攻擊,可能反而會迫使美國參與衝突。同樣,報告認為,在發生區域衝突的情況下,美國對通常主要作為民用的中國基礎設施開展網路攻擊,可能就會產生更深層次的軍事影響。
★★★★★★★★★★★★
Even so, there are plenty of reasons that China and the U.S. would be unlikely to carry out a major attack aimed broadly at civilian populations. In particular, the report points out that close economic relations could mean an unintentional business fallout at home while the interconnectedness of the Internet makes the effects of broad attacks unpredictable (for example, Chinese data stored abroad could be inadvertently disrupted). Also likely to be on the front of Beijing’s mind, the report argues, are a few larger concerns. In particular, during wartime issues surrounding control of potentially destabilizing information within China and tracking of dissident activity are also likely to “loom large.”
38. carry out 執行
39. fallout 不良影響;惡果
40. at home 在國內
41. interconnectedness 緊密關係
42. inadvertently 無意地;非故意地
43. on the front of sb’s mind 在……的腦海中
44. wartime 戰時
45. destabilize 使不穩定;暗中顛覆(反對政權)
46. dissident (n.) 異見者;意見不同者;持不同政見者
47. loom large 顯得突出;變得嚴重
即便如此,仍有充足的理由認為美中不太可能針對平民開展大規模攻擊。特別是美中經濟關係密切,而網際網路具有很強的相互關聯性,廣泛襲擊的影響是不可預知的,因此這種攻擊可能會造成無法預計的商業後果(例如,中國儲存在國外的數據可能會在無意中遭到破壞)。報告認為,北京可能有幾個更加重視的關注點。特別是,在國內控制那些可能導致社會不穩定的訊息,以及追蹤異見者的活動,有可能在戰爭時期「特別重要」。
《紐約時報》完整報導:https://nyti.ms/2RS4b2P
圖片出處:https://bit.ly/2RUKKqa
資訊戰爭講義 (Information Warfare): https://bit.ly/2xcimbQ
★★★★★★★★★★★★
時事英文講義:https://bit.ly/2XmRYXc
時事英文大全:http://bit.ly/2WtAqop
如何使用「時事英文」:https://bit.ly/3a9rr38
#美中網路戰英文
同時也有10000部Youtube影片,追蹤數超過62萬的網紅Bryan Wee,也在其Youtube影片中提到,...
「cyber attack example」的推薦目錄:
- 關於cyber attack example 在 Eric's English Lounge Facebook
- 關於cyber attack example 在 Eric Fan 范健文 Facebook
- 關於cyber attack example 在 Bryan Wee Youtube
- 關於cyber attack example 在 Travel Thirsty Youtube
- 關於cyber attack example 在 スキマスイッチ - 「全力少年」Music Video : SUKIMASWITCH / ZENRYOKU SHOUNEN Music Video Youtube
- 關於cyber attack example 在 8 Most Common Cybersecurity Threats | Types of Cyber Attacks 的評價
cyber attack example 在 Eric Fan 范健文 Facebook 八卦
”Extortionware: 比Ransomware 更難處理。 首先單靠backup 已經不能成為擋箭牌, 當攻擊者進入你的網絡後, 他有可能將敏感資料送到你的「同業」手裡。 從MultiLayer Defense 到Zero Turst ..awareness Education.. 是攻/也是防..
Extortionware is a lot more difficult to predict and protect against. Extortionware attacks are usually highly targeted and are more about the retrieval of data than its destruction or encryption. Once cyber criminals have gained access to your system and taken sensitive information demands are made, usually for money, followed by a threat. For example, criminals may send your company’s intellectual property to competitors or distribute your data online unless they’re paid. However, money isn’t always the motivation behind this sort of attack. The 2015 information leak from website Ashley Maddison was carried out only after hackers gave the company a chance to change their operating policies. The policies weren’t changed and as a result around 36 million user details were released in a highly-publicised leak.
The main concern with this sort of attack is that a backup can’t be you get out of jail free card. Once the criminals have your data there is nothing you can do.
#extortionware #ransomwares #cybersecurityawareness #infosec #technews #technology #cybersecurity
cyber attack example 在 8 Most Common Cybersecurity Threats | Types of Cyber Attacks 的八卦
... <看更多>