英文摘要 |
With the application of the information technology, network technology also goes deep into every corner of human life, especially for China, the growth of e-commerce has gradually deepened for the application of network technology; however, with the profit of economic development, which causes the greediness of the interested parties and Internet crimes. Moreover, the characteristics of anonymous using and free public opinions transmission in Internet, which are inconsistent in the attitude that China towards the media. All above mentioned are the reasons that China began to strengthen its network monitoring ability and build up Internet firewall since 2000, and it's also the Great Firewall of China in order to enhance the network monitoring, hope to control public speech in Internet, and make it not to jeopardize the government's regime. In addition to internal controls, China also understands the use of Internet technology in the military will become the commanding heights of winning future wars. In the past, they had only simple cooperation with folk personnel who has IT professional background, or launched some harassing activities such as the replacing web pages of those websites which had hostile awareness, but recently, the pattern of China network operations has evolved into a theft of information through the Internet, the paralysis of other systems or the use of virus to damage important key infrastructure. Whereas the development of network-oriented is multiple, it's very difficult to be covered in a limited page, therefore, this study focuses on China's internal network control and its external attack technique and type. F urther, this study also tries to integrate the researches of technology perspective in order to be able to have better understanding in the contents of network policy, rather than the discussion of text from the government policy advocacy, that will be the way to glimpse of the actual situation. |