Cyber Security Strategies – an Overview
Author(s): MARTIN, Ioana
Author(s) keywords: cyber security strategy, cyber threats, cyberspace, protect, risks
Reference keywords: cyber threats, information security
Abstract:
For all nations, the revolution in the area of information technology has changed the way business and government operate, as well as the daily life of citizens. Effective cyber security is the key to any nation’s ability to protect its assets, including its reputation, intellectual property, economy and citizens. To counter the evolving cyber threat facing today, leaders must ensure they have an integrated approach to cyber security tailored to their particular aspects and risk profile, addressing not only technical aspects of their defense, but also the people.
The National Cyber Security Strategy establishes the strategic priorities that the national government will pursue in order to achieve the overall aim and objectives of the nation’s cyber security policy.
References:
[1]. ENISA, National Cyber Security Strategies - Practical Guide on Development and Execution, Dec 2012, pp.4 [Online] Available: https://www.enisa.europa.eu/
[2]. A. Klimburg, National Cyber Security – Framework Manual, CCDCOE, 2012.
[3]. ENISA, National Cyber Security Strategies - Setting the course for national efforts to strengthen security in cyberspace, May 2012, [Online] Available: https://www.enisa.europa.eu/
[4]. ENISA, ENISA Threat Landscape 2014 - Overview of current and emerging cyber-threats, December 2014, [Online] Available: https://www.enisa.europa.eu/
[5]. ENISA, An evaluation Framework for National Cyber Security Strategies, November 2014, [Online] Available: https://www.enisa.europa.eu/
[6]. High Representative Of The European Union For Foreign Affairs And Security Policy, Cybersecurity Strategy of the European Union: An Open, Safe and Secure Cyberspace, 2013, [Online] Available: http://eeas.europa.eu/
[7]. OECD (2012), Cybersecurity Policy Making at a Turning Point: Analyzing a New Generation of National Cybersecurity Strategies for the Internet Economy, OECD Digital Economy Papers, No. 211, OECD Publishing, [Online] Available: http://dx.doi.org/10.1787/5k8zq92vdgtl-en
[8]. CTO, Commonwealth Approach for Developing National Cyber security Strategies, [Online] Available: http://www.cto.int/media/fo-th/cyb-sec/
[9]. ITU National CyberSecurity Strategy Guide, September 2011, [Online] Available: http://www.itu.int/
[10]. Alexander Klimburg, National Cyber Security – Framework Manual, CCDCOE, 2012, [Online] Available: https://ccdcoe.org/publications/books/NationalCyber SecurityFrameworkManual.pdf
[11]. J. Harašta, Cyber Security in Young Democracies, December 2013, CEEOL
[12]. U. SVETE, European E-Readiness? Cyber Dimension Of National Security Policies, Journal Of Comparative Politics, CEEOL
[13]. M. Lehto, The Ways, Means and Ends in Cyber Security Strategies, 2012, ProQuest
[14]. Estonia - Cyber Security Strategy(2014), Finland's Cyber Security Strategy (2013), Cyber Security Strategy for Germany (2011), Cyber Security Strategy in Romania (2011), Cyber Security Strategy of the United Kingdom (2011), Cyber Security Strategy for Australia(2011), Canada's cyber security strategy (2010), International Strategy for cyberspace (2011), The Netherlands - The national cyber security strategy (2013), [Online] Available: https://www.enisa.europa.eu/
[15]. National Strategy to Secure Cyberspace (2015, Feb.), [Online] Available: http://www.dhs.gov/national-strategy-secure-cyberspace
Article Title: Cyber Security Strategies – an Overview
Author(s): MARTIN, Ioana
Date of Publication: 2015-06-29
Publication: International Journal of Information Security and Cybercrime
ISSN: 2285-9225 e-ISSN: 2286-0096
Digital Object Identifier: 10.19107/IJISC.2015.01.05
Issue: Volume 4, Issue 1, Year 2015
Section: Studies and Analysis of Cybercrime Phenomenon
Page Range: 33-40 (8 pages)
Copyright ©2012-2024
The International Journal of Information Security and Cybercrime (IJISC)
All rights reserved
The International Journal of Information Security and Cybercrime is a trademark of the Romanian Association for Information Security Assurance (RAISA).
No part of this publication may be reproduced, stored in a retrieval system, photocopied, recorded or archived, without the written permission from RAISA. When authors submit their papers for publication, they agree that the copyright for their article be transferred to the Romanian Association for Information Security Assurance, if the articles are accepted for publication. The copyright covers the exclusive rights to reproduce and distribute the article, including reprints and translations.