National cyber security strategies: management, unification and assessment
Main Article Content
Abstract
Cyber security has become an important issue both on the EU and the national level. Cyber security is now perceived as a part of national security. The newly emerging cyber security policy, comprising national cyber security strategies as an important constituent part, has been recently paid considerable attention. Speaking of national cyber security strategies, a positive thing is that the majority of EU member states have already approved such strategies. However, the approved strategies differ considerably in terms of their content and implementation. The present article aims at identifying reasons for differences in individual national strategies and analyses aspects of their unifications in expectation to find out an optimum balance between the degree of unification and the need to retain differences arising from intrinsic national singularities. To this end, the article analyses the issue of national cyber security on the basis of Lithuania's cyber security strategy as a sample in the context of ENISA good practices for the development of cyber security strategies and by application of ENISA developed KPIs and testing ENISA cyber security strategy evaluation tool. Finally, the article suggests recommendations on further development of national cyber security strategies in terms of their unification and national singularities.
Downloads
Article Details
1. Proposal of Policy for Free Access Periodics
Authors whom publish in this magazine should agree to the following terms:
a. Authors should keep the copyrights and grant to the magazine the right of the first publication, with the work simultaneously permitted under the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 that allows the sharing of the work with recognition of the authorship of the work and initial publication in this magazine.
b. Authors should have authorization for assuming additional contracts separately, for non-exclusive distribution of the version of the work published in this magazine (e.g.: to publish in an institutional repository or as book chapter), with recognition of authorship and initial publication in this magazine.
c. Authors should have permission and should be stimulated to publish and to distribute its work online (e.g.: in institutional repositories or its personal page) to any point before or during the publishing process, since this can generate productive alterations, as well as increasing the impact and the citation of the published work (See The Effect of Free Access).
Proposal of Policy for Periodic that offer Postponed Free Access
Authors whom publish in this magazine should agree to the following terms:
a. Authors should keep the copyrights and grant to the magazine the right of the first publication, with the work simultaneously permitted under the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 [SPECIFY TIME HERE] after the publication, allowing the sharing of the work with recognition of the authorship of the work and initial publication in this magazine.
b. Authors should have authorization for assuming additional contracts separately, for non-exclusive distribution of the version of the work published in this magazine (e.g.: to publish in institutional repository or as book chapter), with recognition of authorship and initial publication in this magazine.
c. Authors should have permission and should be stimulated to publish and to distribute its work online (e.g.: in institutional repositories or its personal page) to any point before or during the publishing process, since this can generate productive alterations, as well as increasing the impact and the citation of the published work (See The Effect of Free Access).
d. They allow some kind of open dissemination. Authors can disseminate their articles in open access, but with specific conditions imposed by the editor that are related to:
Version of the article that can be deposited in the repository:
Pre-print: before being reviewed by pairs.
Post-print: once reviewed by pairs, which can be:
The version of the author that has been accepted for publication.
The editor's version, that is, the article published in the magazine.
At which point the article can be made accessible in an open manner: before it is published in the magazine, immediately afterwards or if a period of seizure is required, which can range from six months to several years.
Where to leave open: on the author's personal web page, only departmental websites, the repository of the institution, the file of the research funding agency, among others.
References
A DIGITAL SINGLE MARKET STRATEGY FOR EUROPE. COM (2015) 192 final. Brussels, 2015. Available: https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:52015DC0192&from=LT. Access: 20 May 2020
A GLOBAL STRATEGY FOR THE EUROPEAN UNION'S FOREIGN AND SECURITY POLICY (2016) http://eeas.europa.eu/archives/docs/top_stories/pdf/eugs_lt_.pdf
CYBER SECURITY. EUROPEAN COMMISSION (2020) https://ec.europa.eu/digital-single-market/en/policies/cybersecurity. Acess: 15 April 2020
CYBER SECURITY STRATEGY OF THE EUROPEAN UNION (2013) An Open, Safe and Secure Cyberspace. JOIN (2013) final 1. Available: https://ec.europa.eu/home-affairs/sites/homeaffairs/files/e-library/documents/policies/organized-crime-and-human-trafficking/cybercrime/docs/join_2013_1_en.pdf. Access: 25 June 2020
HYBRID THREATS: A STRATEGIC COMMUNICATIONS PRESPECTIVE (2019) NATO Strategic Communications Centre of Excellence (NATO StratCom COE), 124 p. https://stratcomcoe.org/hybrid-threats-strategic-communications-perspective
LITHUANIA'S NATIONAL CYBER SECURITY STRATEGY OF 2018 (2018) approved by Decision No 818 of the government of the Republic of Lithuania in 2018. Available: https://e-seimas.lrs.lt/portal/legalAct/lt/TAD/94365031a53411e8aa33fe8f0fea665f?jfwid=dg8d31595. Access: 20 May 2020
MARKOPOULOU, D.; KONSTANTINOU, P.; DE HEART, P. (2019) The new EU cybersecurity framework: The NIS Directive, ENISA's role and the General Data Protection Regulation // Computer Law & Security Review, November 2019, Volume 35, issue 6. Available: https://www.sciencedirect.com/science/article/pii/S0267364919300512?via%3Dihub. Access: 20 May 2020
MUST-KNOWN CYBERSECURITY STATISTICS FOR 2020 (2020) Available: https://www.cyber-observer.com/cyber-news-29-statistics-for-2020-cyber-observer/. Access: 22 May 2020
NATIONAL CYBER SECURITY STRATEGIES – INTERACTIVE MAP. ENISA Available: https://www.enisa.europa.eu/topics/national-cyber-security-strategies/ncss-map/national-cyber-security-strategies-interactive-map. Access: 24 May 2020
NATIONAL CYBER SECURITY STRATEGIES: AN IMPLEMENTATION GUIDE (2020) Available: https://www.enisa.europa.eu/publications/national-cyber-security-strategies-an-implementation-guide. Access: 05 June 2020
NATIONAL CYBERSECURITY STRATEGIES. ENISA (2020) Available: https://www.enisa.europa.eu/topics/national-cyber-security-strategies. Access: 20 May 2020
NATIONAL CYBER SECURITY STRATEGIES. ENISA (2020) Available: https://www.enisa.europa.eu/publications/cyber-security-strategies-paper. Access: 28 May 2020
NCSS GOOD PRACTICE GUIDE. ENISA (2020) Available: https://www.enisa.europa.eu/publications/ncss-good-practice-guide. Access: 27 May 2020
NIS IMPLEMENTATION TRACKER (2019) Available: https://www.digitaleurope.org/resources/nis-implementation-tracker/. Access: 27 May 2020
NUCLEAR ENERGY AND CURRENT SECURITY ENVIRONMENT IN TH AREA OF HYBRID THREATS (2019) Research report. The European Centre of Excellencefor Countering Hybrid Threats. Available: https://www.stratcomcoe.org/nuclear-energy-and-current-security-environment-era-hybrid-threats. Access: 10 June 2020
SABILLON, R.; CAVALLER, V.; CANO, J. (2016) National Cyber Security Strategies: Global Trends in Cyberspace International Journal of Computer Science and Software Engineering (IJCSSE), v. 5, n. 5, p. 67-81. Available: <http://ijcsse.org/published/volume5/issue5/p1-V5I5.pdf>. Acess: 14 April 2020
SCHMITT M. N. (2017) Tallin Manual 2.0 on the International Law Applicable to Cyber Operations. Cambridge University Press. Available: https://assets.cambridge.org/97811071/77222/frontmatter/9781107177222_frontmatter.pdf. Access: 24 May 2020
SPECIAL EUROBAROMETER 480. EUROPEANS’ ATTITUDES TOWARDS INTERNET SECURITY (2019) Available: <http://ec.europa.eu/commfrontoffice/publicopinion/index.cfm/ResultDoc/download/DocumentKy/85495>. Access: 10 April 2020
ŠTITILIS, D.; PAKUTINSKAS, P.; LAURINAITIS, M.; MALINAUSKAITĖ, I. (2017) A model for the national cyber security strategy. The Lithuanian case, Journal of Security and Sustainability, v. 6, n. 3, p. 357-372. https://doi.org/10.9770/jssi.2017.6.3(3).
ŠTITILIS, D.; PAKUTINSKAS, P.; MALINAUSKAITĖ, I. (2016) EU and NATO cybersecurity strategies and national cybersecurity strategies: a comparative analysis. Security Journal, v. 30, n. 4. DOI: 10.1057/s41284-016-0083-9.
THE EUROPEAN AGENDA ON SECURITY. COM (2015) 185 final. Strasbourg. Available: https://ec.europa.eu/home-affairs/sites/homeaffairs/files/e-library/documents/basic-documents/docs/eu_agenda_on_security_en.pdf. Access: 29 June 2020
TROPINA, T.; CALLANAN, C. (2015) Self- and Co-regulation in Cybercrime, Cybersecurity and National Security. Springer.