Presenter Information

Milla Penelope MarkovicFollow

Start Date

14-12-2022 11:45 AM

Description

As technology and internet use have grown, complaints from internet crime victims as well monetary losses due to internet crime have increased as well. Law enforcement have identified some of the top threats in cyber space to be those posed by nation-states, specifically China. Considering the power that the United States holds on the world stage and the knowledge law enforcement has about the issue of cyber attacks on the United States by China, the question of why the country continues to experience such attacks becomes increasingly significant. Furthermore, how can China’s Five-Year Plan, along with United States’ knowledge of its past attacks be used to better understand China’s motivations and combat China’s cyber threat? The proposed research will help answer this question by analyzing past cyber attacks attributed to China along with the Five-Year Plans corresponding to the time of these attacks. It will also analyze China’s most recent Fourteenth Five-Year Plan to identify potential targets.

Comments

Mentor: Professor Matthew Miller

Click below to download individual papers.

  • HNRS 2000 Final Proposal.docx (22 kB)
  • Share

    COinS
     
    Dec 14th, 11:45 AM

    China’s Five-Year Plan and Protecting American Assets

    As technology and internet use have grown, complaints from internet crime victims as well monetary losses due to internet crime have increased as well. Law enforcement have identified some of the top threats in cyber space to be those posed by nation-states, specifically China. Considering the power that the United States holds on the world stage and the knowledge law enforcement has about the issue of cyber attacks on the United States by China, the question of why the country continues to experience such attacks becomes increasingly significant. Furthermore, how can China’s Five-Year Plan, along with United States’ knowledge of its past attacks be used to better understand China’s motivations and combat China’s cyber threat? The proposed research will help answer this question by analyzing past cyber attacks attributed to China along with the Five-Year Plans corresponding to the time of these attacks. It will also analyze China’s most recent Fourteenth Five-Year Plan to identify potential targets.