National Cybersecurity System Act (original) (raw)

Cybersecurity in the European Union Law

Cybersecurity in Poland

The first legal acts adopted within the framework of the European Communities were adopted in the early nineties. However, they were not binding. They contained calls for appropriate actions, identification of some solutions, proposals for draft legal acts, strategies and action plans to improve network security.This chapter, however, highlights the most important binding acts: the first binding EU legal instrument to combat computer crime: Council Framework Decision 2005/222/JHA of the 24th of February 2005 on attacks against information systems, Directive 2013/40/EU of the European Parliament and of the Council of the 12th of August 2013 on attacks against information systems and replacing Council Framework Decision 2005/222/JHA and Directive (EU) 2016/1148 of the European Parliament and of the Council of the 6th of July 2016 concerning measures for a high common level of security of network and information systems across the Union.

National Cyber Security, a commitment for everybody

Information and Communications Technology (ICT) have contributed to the welfare and progress of societies, in such a way that a large part of public and private relations depend on these technologies. Over time and throughout evolution risks have emerged that have made it necessary to manage the ICT security. Initially cyber security was concerned with protecting information reactively, although subsequently it has evolved towards a proactive position which identifies and manages risks that threaten cyber space. Within the framework of the SCSI (Spanish Cyber Security Institute) and ISMS Forum, a study was carried out which developed an approach to concepts of cyber space and cyber security, to known risks and threats, to the existing management in Spain, and to the need to develop a National Cyber Security System to promote the integration of all players and instruments involved, both public and private, and to make good use of the opportunities presented by new technologies, as well as to address the challenges that they present. The main conclusions obtained from the study are summarized in this document.

Towards Comprehensive National Cybersecurity

SpringerBriefs in Cybersecurity, 2015

Information and communication technologies in Macedonia have experienced a phenomenal growth throughout the last decades, which has had a tremendous impact on governmental services' presence in the Internet, as well as on everyday life. Against this background, technologies-based growth introduces new risks and threats to the cyber domain in the country. To respond to those challenges the Macedonian government is pursing the establishment of a national authority to react to cyber attacks that occur, or a Computer Incident Response Team-MKD-CIRT, and the adoption of a National Cybersecurity Strategy. However, it should be taken into account that such tasks are neither easy nor simple. There are several issues that should be considered, for instance: the improvement of the measures for protection of information systems and of the critical infrastructure; the legal and policy framework; the international approach; and the formation of a cybersecurity culture, to name but a few. Simultaneously, considering that Macedonia is a candidate for accession to the EU and NATO, it has to comply with their standards when performing the reforms in the cybersecurity field. The current article briefly introduces the country's steps towards cybersecurity, provides an analysis of the legal, policy and institutional progress achieved, and suggests recommendations that should be considered to ensure safer, secure, trustworthy and resilient cyber space in the country.

[ENG] Cyber Strategy & Policy Brief (Volume 06 - June 2016)

The Cyber Strategy & Policy Brief aims at raising the reader’s awareness on these issues, by monthly analysing the main international events in order to highlight the trends of cyber threats and the lessons learned that might be useful to protect national security. Keywords: Cyber Command, Cyber Intelligence, Cyber Warfare, Israel, Israel Defense Forces, Italian Joint Command for Cyberspace Operations, Italian Joint C4 Command, Italy, NATO, Strategy, Ukraine, Ukraine National Cybersecurity Coordination Centre.

The European framework for cybersecurity: strong assets, intricate history

International Cybersecurity Law Review

Over the last decade, the European Union (EU) has demonstrated a consistent determination to promote a global, open, stable, and secure cyberspace for everyone. A structured (and chronological) review of key EU documents, reports, and directives on cybersecurity shows that the recommendations from the relevant EU institutions (Parliament, Commission, Council) have been persistent over time, reiterating the same core issues that seem to not yet have been solved after a decade of debates and experts’ advice. Since at least 2012, EU institutions have identified the two domains that are under constant critical observation for the deployment of a coordinated European cybersecurity approach—gaps in policies and poor integration—while the European fundamentals of cybersecurity (both human and physical) have been consistently seen as an asset rather than a liability. However, the progressive de-professionalization of coding that tends to blur the distinction between amateurs and professiona...

Cybersecurity in the EU: Threats, Frameworks and future perspectives

Cybersecurity in the EU: Threats, Frameworks and future perspectives, 2019

For several years now, as technology integrates into our lives, security of individuals, organizational and states is challenged by high-profile cyber incidents. Particularly, as the digital era began, it brought new possibilities and positive prospects for communication, trade and businesses. It provided easier and faster access, alleviated transport and several services. More and more daily activities and transactions are conducted through the use of Internet and technological devices. Soon challenges, threats and risks developed in the cyber space, rooted in the acceleration of technology. Virtual attacks are threatening government institutions, critical infrastructure. Sensitive information or personal data are exposed. The digitalization overall can create more fragile and exposed to dangers societies. Obviously, with the utilization and expansion of cyberspace, its security has been addressed as highly important for governmental and non-governmental actors. Over the past years, the European Union has acknowledged the increasing threats deriving from the nature of our digitally driven world, the reliance on automation and the connection to data. Thus, the EU wants to take the responsibility of cyber security in its own hands by shaping a comprehensive and integral cyber security strategy for its member states as an effort to strengthen the resilience of cyberspace, mitigate the cyber threats and explore all the benefits of digital transformation. This paper explores the territory of cyber security in the European Union. In the first place, it reflects on the challenge of defining “cybersecurity” by the European Union. Secondly, it maps the cyber security threats which pressed EU to shape a cyber security strategy. Then, it aims to identify the main cyber security capabilities, frameworks and tools of the EU. The last sectionfeatures the future steps of the European Union towards cyber security and reveals some challenges that the EU member states face in order to achieve a common cyber security policy and cyber security management at the EU level.

[ENG] Cyber Strategy & Policy Brief (Volume 03 - March 2016).pdf

The Cyber Strategy & Policy Brief aims at raising the reader’s awareness on these issues, by monthly analysing the main international events in order to highlight the trends of cyber threats and the lessons learned that might be useful to protect national security. Keywords: Cyber Command, Cyber Intelligence, Cyber Warfare, Denmark, Deterrence, GCHQ, Iran, Marine Corps, Strategy, Syrian Electronic Army, United Kingdom, United States.