IMPLEMENTATION OF NATIONAL CYBERSECURITY STRATEGIES: ECONOMIC AND POLITICAL ASPECT
Abstract
The issue of maintaining the critical infrastructure security is a matter of national security – with or without taking into account the cyber component. However, networks used in critical infrastructure are not immune to growing dependence on Internet technology. Therefore, it can be argued that cybersecurity is combined with national security mainly in critical infrastructure.
In many developed countries, government agencies have been set up to deal with the security of information systems and the response to computer emergency incidents.
The challenges of cybersecurity apply to all countries, and none of them faces exactly the same problems, but most of them are similar, making it possible to develop common universal solutions that can then be adapted to the conditions of specific countries. At the same time, cyberspace is an integral part of the development of any modern state, as powerful cyberspace is crucial for the progress and development of states in the economic, political and social spheres.
This necessitates the development and implementation of national cybersecurity strategies that highlight and emphasize the need to raise awareness of cyberspace issues within heterogeneous categories, such as civil servants, politicians, businessmen, IT-professionals, members of the public, and others. And depending on the approaches used, cybersecurity can be seen either as the responsibility of the private sector, or as the responsibility of individual public authorities – from law enforcement to military agencies, or a combination of both. And the last approach, in our opinion, should be applied in Ukraine.
Downloads
References
Bundesministerium des Innern (2011). Cyber-Sicherheitsstrategie fur Deutschland. URL: http://www.bmi.bund.de/SharedDocs/Downloads/DE/Themen/OEDVerwaltung/Informationsgesellschaft/ cyber.pdf.
De Nationale Cyber Security Strategie: Slagkracht Door Samenwerking (2011). Netherlands Ministry of Security and Justice, The Hague, Netherlands. URL: http://www.rijksoverheid.nl/bestanden/documenten-en-publicaties/rapporten/2011/02/22/nationale-cyber-security-strategieslagkracht-door- samenwerking/de-nationale-cyber-security-strategie-definitief.pdf.
Department of Information Technology, Ministry of Communications and Information Technology (2018). New Delhi, India. URL: http://www.mit.gov.in/sites/upload_files/dit/files/ncsp_060411.pdf.
French Network and Information Security Agency (2011). Information Systems Defense and Security France’s Strategy. URL: http://www.ssi.gouv.fr/IMG/pdf/2011-02-15 Information system defence and security - France s strategy.pdf.
Klimburg, A. and Healey, J. (2012). Strategic Goals & Stakeholders. National Cyber Security Framework Manual. Alexander Klimburg (Ed.). NATO CCD COE Publication, Talinn.
Melissen, J. (2007). The New Public Diplomacy: Soft Power in International Relations. New York, Palgrave.
Macmillan Morse, A. (2013). The UK Cyber Security Strategy: Landscape Review. National Audit Office, London Oxford University Press.
Smith, David (2020). Why Cybersecurity Is Vital in the Public Sector. May 08, 2020. URL: https://www.acfeinsights.com/acfe-insights/why-cybersecurity-is-vital-in-the-public-sector.
The Dutch Ministry of Security and Justice (2011). The National Cyber Security Strategy. The Hague. URL: .https://www.enisa.europa.eu/media/news-items/dutch-cvber-securitv-strategv-2011.
The UK Cabinet Office (2019). The UK Cyber Security Strategy Protecting and promoting the UK in a digital world. URL: https://www.gov.uk/government/uploads/system/uploads/attachment-data/file/60961/uk-cyber-security-strategy-final.pdf.
The White House (2011). International Strategy for Cyberspace, Prosperity, Security, and Openness in a Networked World. Washington. URL: .http://www.whitehouse.gov/sites/default/files/rss viewer/international strategy for cyberspace.pdf.
Turkish Ministry of Transport, Maritime Affairs and Communication (2013). National Cyber Security Strategy and Action Plan 2013-2014. Ankara. URL : http://www.ccdcoe.org/strategies/TURCyberSecurity.pdf.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).