The fact is, contrary to what the majority of people think, “Cyberspace” is not a virtual and unrealistic space. In fact, the use of virtual words has led to the misleading of individuals and ideas in this area. Real space cyberspace is a new field for impact and as a result of friendship, cooperation, competition, hostility and even war between countries and other actors. These cases clearly show that the Internet and cyberspace have provided a new field for politics, a space in which individuals, groups and governments are acting and policy makers.
For emerging countries, cyberspace is considered as the basis for economic growth as well as the speed of industrial and technical progress in many sectors. But in some countries (such as China), this space is seen as a threat to the ruling political regime, and this generally leads to the use of filters and dams for controlling Internet access and use. For some countries, cyberspace could be a geopolitical challenge in the development of international relations; it seems that the decision of the BRICS group to establish a submarine fiber network around the United States has been the same.
Thus, some of these countries are trying to control Internet access points by creating a single port. Although this approach is inconsistent with the general scheme of the Internet for access to all networks, it can benefit from the domestic policy of countries (controlling trans-border information content) as well as the foreign policy of countries (defense preparedness against potential attacks under the framework of the defense).
In the field of cyberspace, the People’s Republic of China, in addition to monitoring and controlling the Internet, is developing another policy:
Developments of aggressive are capabilities for cyber-espionage activities, neutralization or temporary paralysis of national information systems.
Since 2006, events have occurred that indicate that Chinese services have been spying on various systems in Western countries (US, Germany, United Nations, etc.), and analyzes conducted by companies Cyber security suggests a – or even several – cyber-espionage operations against governments, multinational corporations and some global organizations.
Currently, the increasing abuse of the defects and shortcomings of information systems and cybernetic networks and the escalation of its results, targeting sensitive infrastructure, military or government, have caused some malicious cybercrime activities It is considered to be a fire of war and requires cyber or physical retaliation. In the same vein, the White House emphasized the right to defend itself against cyber-attacks in the “International Strategy for Cyberspace” document. These elements have led to the possibility of creating appropriations, weapons and organizations aimed at cyber-bullying in a broader context than cyber defense strategies documents; the main and final objective of which should be the transition from a solid defense strategy based on “lines The defense of the Magnino “and the creation of an approach with wider security solutions.
Thus, many countries have almost announced that they are demanding the development of their own cyber defense capabilities (that is, they want to be equipped with an “Adhak” command and counter-attack equipment) to be able to respond to attacks that may be the main infrastructure of the sectors have a vital threat to them.
The evolution of cyber capabilities includes the possibility of advancing offensive operations against individuals and organizations that may engage in hostile activities, in particular the threat of retaliation against potential attackers to affect their strategic calculations and to deter them from Committing to malicious activities is done.
Certainly, the presentation of such a cyber-strategy requires the redefining of Western countries’ strategies for cyber security. Namely, the redefinition of weapons that need to be developed to respond to current and future cyber security issues; and also to redefine the fundamental philosophy of cyber security issues so that operational cooperation between different sectors, including private, executive, security forces and even the public is possible.
In fact, the basis of China’s cyber policy is based on the capture of informatics and communications technologies in order to achieve economic benefits, as well as to establish an information warfare strategy, in which systems provide the Chinese People’s Army with access to systems are connected to the Internet, thus threatening the security of infrastructures, exchanges and data stored by governments, especially Western governments, and users. From this point of view, it can be said that China has long been in possession of a cyber-deterrent system that appears to be a vehicle for cyber-espionage in the world.