Abstract
A number of nations developed and published a national cyber security strategy (NCSS). Most of them were published in the period 2009 - 2011. Despite the fact that each of these NCSS intends to address the cyber security threat, large differences exist between the NCSS approaches. This paper analyses and compares the NCSS of Australia, Canada, Czech Republic, France, Germany, Japan, The Netherlands, New Zealand, the United Kingdom, and the United States. Thirteen observations lead to a set of conclusions which nations with an NCSS and developers of future NCSS may use to their advantage.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Rauscher, K.F., Yashenko, V. (eds.): Critical Technology Foundations. EastWest Institute, London (2011), http://www.ewi.info/system/files/reports/Russia-U%20S%20%20bilateral%20on%20terminology%20v76%20%282%29.pdf
The White House, Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure, Washington, DC, USA (2010), http://www.whitehouse.gov/assets/documents/Cyberspace_Policy_Review_final.pdf
European Commission, A Digital Agenda for Europe – COM(2010) 245 final/2, Brussels, Belgium (2010), http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:52010DC0245R(01):EN:NOT
Attorney General, Cyber Security Strategy, Australia (2009), http://www.ag.gov.au/www/agd/agd.nsf/Page/CyberSecurity_CyberSecurity#h2strategy
Public Safety Canada, Canada’s Cyber Security Strategy: For a stronger and more prosperous Canada (2010), http://www.publicsafety.gc.ca/prg/ns/cybr-scrty/_fl/ccss-scc-eng.pdf
Sécurité publique Canada, Stratégie de cybersécurité du Canada: Renforcer le Canada et accroître sa prospérité, Ottawa, Canada (2010), http://www.publicsafety.gc.ca/prg/ns/cybr-scrty/_fl/ccss-scc-fra.pdf
Ministry of Interior, Cyber Security Strategy of the Czech Republic for the 2011-2015 period (Strategii pro oblast kybernetické bezpečnosti České republiky na období 2011-2015), Prague, Czech Republic (2011), http://www.enisa.europa.eu/media/news-items/CZ_Cyber_Security_Strategy_20112015.PDF
Secrétariat général de la défense et de la sécurité nationale, Défense et sécurité des systèmes d’information: Stratégie de la France (2011), http://www.ssi.gouv.fr/IMG/pdf/2011-02-15_Defense_et_securite_des_systemes_d_information_strategie_de_la_France.pdf
Secrétariat général de la défense et de la sécurité nationale, Défense et Sécurité nationale: Le Livre Blanc, Paris, France (2008), http://www.defense.gouv.fr/portail-defense/enjeux2/politique-de-defense/livre-blanc-2008
Bundesministerium des Innern, Cyber Sicherheitsstrategie für Deutschland (2011), http://www.bmi.bund.de/SharedDocs/Downloads/DE/Themen/OED_Verwaltung/Informationsgesellschaft/cyber.pdf?__blob=publicationFile
Federal Ministry of the Interior, Cyber Security Strategy for Germany, Germany (2011), http://www.cio.bund.de/SharedDocs/Publikationen/DE/Strategische-Themen/css_engl_download.pdf?__blob=publicationFile
Information Security Strategy for Protecting the Nation, Information Security Policy Council, Tokyo, Japan (2010), http://www.nisc.go.jp/eng/pdf/New_Strategy_English.pdf
The First National Strategy on Information Security: towards the realization of a trustworthy society, Information Security Policy Council, Tokyo, Japan (2006), http://www.nisc.go.jp/eng/pdf/national_strategy_001_eng.pdf
Netherlands Ministry of Security and Justice, De Nationale Cyber Security Strategie: Slagkracht door samenwerking, The Hague, The Netherlands (2011), http://www.rijksoverheid.nl/bestanden/documenten-en-publicaties/rapporten/2011/02/22/nationale-cyber-security-strategie-slagkracht-door-samenwerking/de-nationale-cyber-security-strategie-definitief.pdf
Netherlands Ministry of Security and Justice, The National Cyber Security Strategy (NCSS): Success through Cooperation, The Hague, Netherlands (2011), http://www.enisa.europa.eu/media/news-items/dutch-cyber-security-strategy-2011
Ministry of Economic Development, New Zealand’s Cyber Security Strategy, New Zealand (2011), http://www.dpmc.govt.nz/dpmc/publications/nzcss
Cabinet Office, Cyber Security Strategy of the United Kingdom: safety, security and resilience in cyber space, London, United Kingdom (2009), http://www.official-documents.gov.uk/document/cm76/7642/7642.pdf
HM Government, The National Security Strategy Update 2009: Security for the Next Generation, London, United Kingdom (2009), http://www.official-documents.gov.uk/document/cm75/7590/7590.pdf
HM Government, A Strong Britain in an Age of Uncertainty: The National Security Strategy, London, United Kingdom (2010), http://www.direct.gov.uk/prod_consum_dg/groups/dg_digitalassets/@dg/@en/documents/digitalasset/dg_191639.pdf?CID=PDF&PLA=furl&CRE=nationalsecuritystrategy
The National Strategy to Secure Cyberspace, The White House, USA (2003), http://www.us-cert.gov/reading_room/cyberspace_strategy.pdf
http://lafiga.firedoglake.com/2011/06/03/finally-an-intelligent-use-for-cupcakes-hacking-terrorist-sites (last visited June 30, 2013)
Council of Europe, Convention on Cybercrime, ETS No. 185 (2001), http://conventions.coe.int/Treaty/EN/Treaties/html/185.htm
The White House, International Strategy for Cyberspace, Washington, DC, USA (2011), http://www.whitehouse.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Luiijf, H.A.M., Besseling, K., Spoelstra, M., de Graaf, P. (2013). Ten National Cyber Security Strategies: A Comparison. In: Bologna, S., Hämmerli, B., Gritzalis, D., Wolthusen, S. (eds) Critical Information Infrastructure Security. CRITIS 2011. Lecture Notes in Computer Science, vol 6983. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-41476-3_1
Download citation
DOI: https://doi.org/10.1007/978-3-642-41476-3_1
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-41475-6
Online ISBN: 978-3-642-41476-3
eBook Packages: Computer ScienceComputer Science (R0)