Depending on the amount of data to process, file generation may take longer.

If it takes too long to generate, you can limit the data by, for example, reducing the range of years.

Article

Download file Download BibTeX

Title

Asian Cyber Security Standards

Authors

[ 1 ] Instytut Podstaw Bezpieczeństwa, Wydział Bezpieczeństwa Narodowego, Akademia Sztuki Wojennej | [ P ] employee

Scientific discipline (Law 2.0)

[6.3] Security studies

Title variant

PL Azjatyckie standrady cyberbezpieczeństwa

Year of publication

2020

Published in

Safety & Defense

Journal year: 2020 | Journal volume: vol. 6 | Journal number: no 2

Article type

scientific article

Publication language

english

Keywords
PL
  • Azja
  • Bezpieczeństwo teleinformatyczne
  • Rzeczywistość wirtualna
  • Technologia informacyjna (IT)
EN
  • Asia
  • Cybersecurity
  • IT security
Abstract

EN The scientific considerations outlined in this article address the threat to the cyber security quality system arising from unclear security standards implemented by China. Over the past few years, the Chinese government has imposed almost 300 new national cyber security standards. These norms cover a variety of information and communication technology (ICT) services as well as products, including software, routers, switches and firewalls. This standardization increases the threat to the cybersecurity quality system, and the more the US places pressure on the west-ern world for Chinese companies investing outside China and on western firms trading in China, the more difficult the situation becomes. The aim of this assessment is to identify these threats, which are also difficulties encountered by Western companies trying to develop their operations in China in order to minimize them. The study was compiled as an analysis of Chinese cybersecurity standardization policy documents and their confrontation with the practice offoreign businesses and as an analysis of international reports and standardization documents on cybersecurity. The theoretical investigative methods used in this paper are: synthesis, analysis, abstraction and generalization.

Date of online publication

2020

Pages (from - to)

21 - 32

DOI

10.37105/sd.75

URL

https://sd-magazine.eu/index.php/sd/article/view/75/59

Comments

Bibliografia na stronach 31-32. Opublikowano: 07.08.2020.

License type

CC BY (attribution alone)

Open Access Mode

open journal

Open Access Text Version

final published version

Release date

2020

Full text of article

Download file

Access level to full text

public

Ministry points / journal

20

Ministry points / journal in years 2017-2021

70