Research Article
BibTex RIS Cite

CYBER SECURITY POLICY: A COMPARATIVE ANALYSIS ON USA, RUSSIA AND CHINA

Year 2019, , 229 - 252, 13.11.2019
https://doi.org/10.28956/gbd.646311

Abstract



The importance of country
borders within the national security policy has begun to diminish continuously
with the acceleration of the globalization process in recent years. With
globalization, the power distribution channels of the countries have been
reshaped; asymmetrical power relations have emerged and the needs for national
security of countries have been redefined. Technological developments in recent
years have disclosed the concept of cyber security and cyber security has
become an important element of the national security of countries. The
structure of the Internet that exceeds the borders of countries, the use of
internet networks in the critical infrastructures of the state and in the
execution of public services beyond the individual services and objectives, and
the increasing e-government applications have further reinforced the importance
of cyber security in national security. In this context, the study comparatively
examined the cyber security policies of the USA, Russia and China particularly
on the basis of official policy documents published in these three countries
and such an analysis is presented.




References

  • Bello, F. (2011). Public Policy Implication on National Security. Erişim tarihi: 08.04.2017, http://nials-nigeria.org/pub/lFATIMABELLO.pdfn
  • Breene, K. (2016). There Are Now Five Countries Considered to be Cyberwar Superpowers. Erişim tarihi: 27.03.2017, https://www.weforum.org/agenda/ 2016/05/who-are-the-cyberwar-superpowers/
  • Buchanan, J. M., (1984). Politics without Romance: A Sketch of Positive Public Choice Theory and Its Normative Implications. Ed: J.M. Bunchanan ve R. D. Tollison. The Theory of PublicChoice II. USA: The University of Michigan Press.
  • Cavelty, M. D. (2014). Breaking the Cyber-security Dilemma: Aligning Security Needs and Removing Vulnerabilities. Science and Engineering Ethics, 20(3), 701-715.
  • Clark, D., Berson, T., and Lin, H. S., (2014). At the Nexus of Cybersecurity and Public Policy. Computer Science and Telecommunications Board. National Research Council, Washington DC: The National Academies Press.
  • Clarke, R. A. ve Robert, K. K. (2010). Cyber War: The Next Threat to National Security and What to Do About It. New York: Harper Collins. COV (2017). China Passes New Cybersecurity Law. Erişim tarihi: 27.07.2017, https://www.cov.com/- /media/files/corporate/publications/2016/11/china_passes_new_cybersecurity_law.pdf
  • DOD (2011). Department of Defense Strategy for Operating in Cyberspace. Department of Defense. Erişim tarihi: 17.04.2017, http://csrc.nist.gov/groups/SMA/ispab/documents/DOD-Strategy-for-Operating-in-Cyberspace.pdf
  • DOD (2012). Military and Security Developments Involving the Democratic People’s Republic of Korea. USA: Department of Defense.
  • DOD (2013). DoD Strategy for Defending Networks, Systems, and Data. Department of Defense, Erişim tarihi: 18.04.2017, http://iac.dtic.mil/csiac/ download/DDNSD_Public_Releasable_11132014.pdf
  • DOD (2015). The DOD Cyber Strategy. Washington: The Department of Defense. Erişim tarihi: 19.07.2017, https://www.defense.gov/Portals/1/features /2015/0415_cyber-strategy/Final_2015_DoD_CYBER_STRATEGY_for_ web.pdf
  • Doyle, R. B. (2007). The U.S. National Security Strategy: Policy, Process, Problems, Public Administration Review, 67(4), 624-629.
  • Erickson, J. (2008). Hacking: The Art of Exploitation. San Francisco: No Starch Press.
  • Fei, G. (2011). China’s Cybersecurity Challenges and Foreign Policy. Georgetown Journal of International Affairs, 2011, 185-190.
  • GCHQ (2012). 10 Steps to Cyber Security. UK: Crown.
  • Gierow, H. J. (2015). Cyber Security in China: Internet Security, Protectionism and Competitiveness: New Challenges to Western Businesses. Mercator Institute for China Studies, (22), 1-10.
  • Giles, K. (2012). Russia’s Public Stance on Cyberspace Issues. 4th International Conference on Cyber Conflict, Tailinn: NATO CCD COE Publications.
  • Giles, K. (2013). Internet Use and Cyber Security in Russia. Russian Analytical Digest No: 134, Erişim tarihi: 24.04.2017, http://www.css.ethz.ch/content/dam /ethz/special-interest/gess/cis/center-for-securities-studies/pdfs/RAD-134-2-4.pdf
  • Gohlert, E. W. (1974). National Security Policy Formation in Comparative Perspective. Policy Studies Journal, 3(2), 174-177.
  • Harold, S. W., Libicki, M. C. ve Cevallos, A. S. (2016). Getting to Yes with China in Cyberspace. CA: RAND Corporation.
  • ISS (2017). Basic Principles for Sate Policy of the Russian Federation in the Field of International Information Security to 2020. Erişim tarihi: 23.04.2017, https://ccdcoe.org/sites/default/files/strategy/RU_state-policy.pdf
  • ITU (2015). Global Cybersecurity Index (GCI) 2015. Erişim tarihi: 25.06.2019, https://www.itu.int/dms_pub/itu-d/opb/str/D-STR-SECU-2015-PDF-E.pdf
  • ITU (2017). Global Cybersecurity Index (GCI) 2017. Erişim tarihi: 25.06.2019, https://www.itu.int/dms_pub/itu-d/opb/str/D-STR-GCI.01-2017-R1-PDF-E.pdf
  • ITU (2018). Global Cybersecurity Index (GCI) 2018. Erişim tarihi: 25.06.2019, https://www.itu.int/en/ITU-D/Cybersecurity/Documents/draft-18-00706_Global-Cybersecurity-Index-EV5_print_2.pdf
  • Kara, M. (2013). Siber Saldırılar-Siber Savaşlar ve Etkileri. Yayınlanmamış Yüksek Lisans Tezi, İstanbul Bilgi Üniversitesi Sosyal Bilimler Enstitüsü.
  • Kay, S. (2004). Globalization, Power, and Security. Security Dialogue, 35(1), 9–25.
  • Kirshner, J. (2006). Globalization and National Security. NY: Routledge.
  • KMPG (2016). Cyber Security in China. Management Consulting. China: KMPG.
  • Korff, D. (t.y.). Cyber Security Definitions. UK: Associate of the Oxford Martin School of the University of Oxford’s Global Cybersecurity Capacity Centre.
  • Kshetri, N. (2016). The Quest to Cyber Superiority. Switzerland: Springer.
  • Lantis, S. J. (2002). Strategic Culture and National Security Policy. International Studies Review, 4(3), 87-113.
  • Lehman, J. ve Willett, T. D. (1986). National Security and Industrial Policy: The Need For a Public Choice Perspective. Contemporary Policy Issues, (7), 36-47.
  • Lieberthal, K. ve Singer, P. W. (2012). Cybersecurity and U.S. - China Relations. Brookings.
  • Lindsay, J. R. (2015). The Impact of China on Cybersecurity. International Security, 39(3), 7-47.
  • Lu, M. (2014). Types of Cyber Attacks. Trustworthy Cyber Infrastructure For The Power Grid. Erişim tarihi: 18.03.2017, https://tcipg.org/sites/default/files/ rgroup/tcipg-reading-group-fall_2014_09- 12.pdf
  • Medvedev, S. A. (2015). Offense-Defense Theory Analysis of Russian Cyber Capability. Masters' Thesis, California: Naval Postgraduate School.
  • O’Shea, K. (2003). Cyber Attack Investigative Tools and Technologies. İç. HTCIA, Institute for Security Technology Studies, Hanover, NH: Dartmouth College.
  • Raud, M. (2016). China and Cyber: Attitudes, Strategies, Organisation. Tallinn: NATO Cooperative Cyber Defence Centre of Excellence.
  • RNS (2015). Russian National Security Strategy. December 2015 – Full-text Translation. Erişim tarihi: 21.04.2017, http://www.ieee.es/Galerias/fichero/ OtrasPublicaciones/Internacional/2016/Russian-National-Security-Strategy-31Dec2015.pdf
  • Rollins, J. W. (2015). U.S.–China Cyber Agreement. Erişim tarihi: 28.04.2017, https://fas.org/sgp/crs/row/IN10376.pdf
  • RSG (t.y.). Концепция стратегии кибербезопасности Российской федерации (Rusya Federasyonu Siber Güvenlik Stratejisi Kavramı) Erişim tarihi: 21.04.2017, http://www.council.gov.ru/media/files/41d4b3dfbdb25cea8a73.pdf
  • Spade, C. J. M. (2012). Information As Power: China's Cyber Power and American's National Security. U.S. Army War College.
  • Swaine, M. D. (2013). Chinese Views on Cybersecurity in Foreign Relations. China Leadership Monitor, 1-27. Symantec (2018). 2017 Norton Cyber Security Insights Report Global Results. Erişim tarihi: 02.07.2019, https://www.symantec.com/content/ dam/symantec/docs/about/2017-ncsir-global-results-en.pdf
  • Techinasia. (2017). China Now Has 731 Million Internet Users, 95% Access From Their Phones. Erişim tarihi: 27.04.2017, https://www.techinasia.com/china-731-million-internet-users-end-2016
  • WH (2003). The National Strategy to Secure Cyberspace. Washington: The White House. Erişim tarihi: 17.04.2017, https://www.us-cert.gov/sites/default/files/ publications/cyberspace_strategy.pdf
  • Yue, O. (2003). Cyber Security. Technology in Society, (25): 565–569.

SİBER GÜVENLİK POLİTİKASI: ABD, RUSYA VE ÇİN ÜZERİNE KARŞILAŞTIRMALI BİR ANALİZ

Year 2019, , 229 - 252, 13.11.2019
https://doi.org/10.28956/gbd.646311

Abstract



Ülke sınırlarının ulusal güvenlik politikası açısından taşıdığı önem,
son yıllarda giderek hızlanan küreselleşme süreci ile birlikte azalmaya
başlamıştır. Küreselleşme ile birlikte dünyada, ülkelerin güç dağılım kanalları
yeniden şekillenmiş, asimetrik güç ilişkileri ortaya çıkmış ve ulusal güvenlik
ihtiyaçları yeniden tanımlanmıştır. Son yıllarda yaşanan teknolojik gelişmeler
siber güvenlik kavramını ortaya çıkarmış ve siber güvenlik, ulusal güvenliğin
önemli bir unsuru haline gelmiştir. İnternetin, ülkelerin sınırlarını aşan
yapısı, internet ağlarının bireysel hizmetlerin ve amaçların ötesinde devletin
kritik altyapılarında ve kamu hizmetlerinin yürütülmesinde kullanılması, gün
geçtikçe gelişen e-devlet uygulamaları, siber güvenliğin ulusal güvenlik
içerisindeki önemini daha da pekiştirmiştir.  
Bu bağlamda, çalışmada ABD, Rusya ve Çin’in siber güvenlik politikaları,
özellikle bu üç ülkede yayınlanan resmi politika belgeleri temelinde
incelenmekte ve karşılaştırmalı bir analiz yapılmaktadır
.



References

  • Bello, F. (2011). Public Policy Implication on National Security. Erişim tarihi: 08.04.2017, http://nials-nigeria.org/pub/lFATIMABELLO.pdfn
  • Breene, K. (2016). There Are Now Five Countries Considered to be Cyberwar Superpowers. Erişim tarihi: 27.03.2017, https://www.weforum.org/agenda/ 2016/05/who-are-the-cyberwar-superpowers/
  • Buchanan, J. M., (1984). Politics without Romance: A Sketch of Positive Public Choice Theory and Its Normative Implications. Ed: J.M. Bunchanan ve R. D. Tollison. The Theory of PublicChoice II. USA: The University of Michigan Press.
  • Cavelty, M. D. (2014). Breaking the Cyber-security Dilemma: Aligning Security Needs and Removing Vulnerabilities. Science and Engineering Ethics, 20(3), 701-715.
  • Clark, D., Berson, T., and Lin, H. S., (2014). At the Nexus of Cybersecurity and Public Policy. Computer Science and Telecommunications Board. National Research Council, Washington DC: The National Academies Press.
  • Clarke, R. A. ve Robert, K. K. (2010). Cyber War: The Next Threat to National Security and What to Do About It. New York: Harper Collins. COV (2017). China Passes New Cybersecurity Law. Erişim tarihi: 27.07.2017, https://www.cov.com/- /media/files/corporate/publications/2016/11/china_passes_new_cybersecurity_law.pdf
  • DOD (2011). Department of Defense Strategy for Operating in Cyberspace. Department of Defense. Erişim tarihi: 17.04.2017, http://csrc.nist.gov/groups/SMA/ispab/documents/DOD-Strategy-for-Operating-in-Cyberspace.pdf
  • DOD (2012). Military and Security Developments Involving the Democratic People’s Republic of Korea. USA: Department of Defense.
  • DOD (2013). DoD Strategy for Defending Networks, Systems, and Data. Department of Defense, Erişim tarihi: 18.04.2017, http://iac.dtic.mil/csiac/ download/DDNSD_Public_Releasable_11132014.pdf
  • DOD (2015). The DOD Cyber Strategy. Washington: The Department of Defense. Erişim tarihi: 19.07.2017, https://www.defense.gov/Portals/1/features /2015/0415_cyber-strategy/Final_2015_DoD_CYBER_STRATEGY_for_ web.pdf
  • Doyle, R. B. (2007). The U.S. National Security Strategy: Policy, Process, Problems, Public Administration Review, 67(4), 624-629.
  • Erickson, J. (2008). Hacking: The Art of Exploitation. San Francisco: No Starch Press.
  • Fei, G. (2011). China’s Cybersecurity Challenges and Foreign Policy. Georgetown Journal of International Affairs, 2011, 185-190.
  • GCHQ (2012). 10 Steps to Cyber Security. UK: Crown.
  • Gierow, H. J. (2015). Cyber Security in China: Internet Security, Protectionism and Competitiveness: New Challenges to Western Businesses. Mercator Institute for China Studies, (22), 1-10.
  • Giles, K. (2012). Russia’s Public Stance on Cyberspace Issues. 4th International Conference on Cyber Conflict, Tailinn: NATO CCD COE Publications.
  • Giles, K. (2013). Internet Use and Cyber Security in Russia. Russian Analytical Digest No: 134, Erişim tarihi: 24.04.2017, http://www.css.ethz.ch/content/dam /ethz/special-interest/gess/cis/center-for-securities-studies/pdfs/RAD-134-2-4.pdf
  • Gohlert, E. W. (1974). National Security Policy Formation in Comparative Perspective. Policy Studies Journal, 3(2), 174-177.
  • Harold, S. W., Libicki, M. C. ve Cevallos, A. S. (2016). Getting to Yes with China in Cyberspace. CA: RAND Corporation.
  • ISS (2017). Basic Principles for Sate Policy of the Russian Federation in the Field of International Information Security to 2020. Erişim tarihi: 23.04.2017, https://ccdcoe.org/sites/default/files/strategy/RU_state-policy.pdf
  • ITU (2015). Global Cybersecurity Index (GCI) 2015. Erişim tarihi: 25.06.2019, https://www.itu.int/dms_pub/itu-d/opb/str/D-STR-SECU-2015-PDF-E.pdf
  • ITU (2017). Global Cybersecurity Index (GCI) 2017. Erişim tarihi: 25.06.2019, https://www.itu.int/dms_pub/itu-d/opb/str/D-STR-GCI.01-2017-R1-PDF-E.pdf
  • ITU (2018). Global Cybersecurity Index (GCI) 2018. Erişim tarihi: 25.06.2019, https://www.itu.int/en/ITU-D/Cybersecurity/Documents/draft-18-00706_Global-Cybersecurity-Index-EV5_print_2.pdf
  • Kara, M. (2013). Siber Saldırılar-Siber Savaşlar ve Etkileri. Yayınlanmamış Yüksek Lisans Tezi, İstanbul Bilgi Üniversitesi Sosyal Bilimler Enstitüsü.
  • Kay, S. (2004). Globalization, Power, and Security. Security Dialogue, 35(1), 9–25.
  • Kirshner, J. (2006). Globalization and National Security. NY: Routledge.
  • KMPG (2016). Cyber Security in China. Management Consulting. China: KMPG.
  • Korff, D. (t.y.). Cyber Security Definitions. UK: Associate of the Oxford Martin School of the University of Oxford’s Global Cybersecurity Capacity Centre.
  • Kshetri, N. (2016). The Quest to Cyber Superiority. Switzerland: Springer.
  • Lantis, S. J. (2002). Strategic Culture and National Security Policy. International Studies Review, 4(3), 87-113.
  • Lehman, J. ve Willett, T. D. (1986). National Security and Industrial Policy: The Need For a Public Choice Perspective. Contemporary Policy Issues, (7), 36-47.
  • Lieberthal, K. ve Singer, P. W. (2012). Cybersecurity and U.S. - China Relations. Brookings.
  • Lindsay, J. R. (2015). The Impact of China on Cybersecurity. International Security, 39(3), 7-47.
  • Lu, M. (2014). Types of Cyber Attacks. Trustworthy Cyber Infrastructure For The Power Grid. Erişim tarihi: 18.03.2017, https://tcipg.org/sites/default/files/ rgroup/tcipg-reading-group-fall_2014_09- 12.pdf
  • Medvedev, S. A. (2015). Offense-Defense Theory Analysis of Russian Cyber Capability. Masters' Thesis, California: Naval Postgraduate School.
  • O’Shea, K. (2003). Cyber Attack Investigative Tools and Technologies. İç. HTCIA, Institute for Security Technology Studies, Hanover, NH: Dartmouth College.
  • Raud, M. (2016). China and Cyber: Attitudes, Strategies, Organisation. Tallinn: NATO Cooperative Cyber Defence Centre of Excellence.
  • RNS (2015). Russian National Security Strategy. December 2015 – Full-text Translation. Erişim tarihi: 21.04.2017, http://www.ieee.es/Galerias/fichero/ OtrasPublicaciones/Internacional/2016/Russian-National-Security-Strategy-31Dec2015.pdf
  • Rollins, J. W. (2015). U.S.–China Cyber Agreement. Erişim tarihi: 28.04.2017, https://fas.org/sgp/crs/row/IN10376.pdf
  • RSG (t.y.). Концепция стратегии кибербезопасности Российской федерации (Rusya Federasyonu Siber Güvenlik Stratejisi Kavramı) Erişim tarihi: 21.04.2017, http://www.council.gov.ru/media/files/41d4b3dfbdb25cea8a73.pdf
  • Spade, C. J. M. (2012). Information As Power: China's Cyber Power and American's National Security. U.S. Army War College.
  • Swaine, M. D. (2013). Chinese Views on Cybersecurity in Foreign Relations. China Leadership Monitor, 1-27. Symantec (2018). 2017 Norton Cyber Security Insights Report Global Results. Erişim tarihi: 02.07.2019, https://www.symantec.com/content/ dam/symantec/docs/about/2017-ncsir-global-results-en.pdf
  • Techinasia. (2017). China Now Has 731 Million Internet Users, 95% Access From Their Phones. Erişim tarihi: 27.04.2017, https://www.techinasia.com/china-731-million-internet-users-end-2016
  • WH (2003). The National Strategy to Secure Cyberspace. Washington: The White House. Erişim tarihi: 17.04.2017, https://www.us-cert.gov/sites/default/files/ publications/cyberspace_strategy.pdf
  • Yue, O. (2003). Cyber Security. Technology in Society, (25): 565–569.
There are 45 citations in total.

Details

Primary Language Turkish
Subjects International Relations
Journal Section Articles
Authors

Volkan Göçoğlu 0000-0002-7036-2416

Mehmet Devrim Aydın 0000-0001-8959-6194

Publication Date November 13, 2019
Submission Date February 7, 2019
Published in Issue Year 2019

Cite

APA Göçoğlu, V., & Aydın, M. D. (2019). SİBER GÜVENLİK POLİTİKASI: ABD, RUSYA VE ÇİN ÜZERİNE KARŞILAŞTIRMALI BİR ANALİZ. Güvenlik Bilimleri Dergisi, 8(2), 229-252. https://doi.org/10.28956/gbd.646311

24347   14728   14731   14739   


Bu dergi creative commons Atıf-GayriTicari 4.0 Uluslararası lisansı ile lisanslanmıştır.   29846