Cybersecurity
Resilience Management Framework for Critical Information Infrastructure: Designing the Level of Trust that Encourages the Exchange of Health Data
Cybernetic Approach to Developing Resilient Systems: Concept, Models and Application
Neglected Cybersecurity Risks in the Public Internet Hosting Service Providers
Analysis of Cybersecurity Issues in the Maritime Industry
A Logical Model for Multi-Sector Cyber Risk Management
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
Introduction
National Cyber Security Strategy and the Emergence of Strong Digital Borders
Introduction
Cybersecurity in Switzerland: Challenges and the Way Forward for the Swiss Armed Forces
Policy Highlights
Like in any other European state, cybersecurity has grown in importance in Swiss politics. And although Switzerland’s cybersecurity and defense policies are still a work in progress, the nation has made tremendous efforts in getting cybersecurity policies, roles, and responsibilities right.
Israel Defense Forces and National Cyber Defense
Michael Warner, the Cyber Command Historian at the U.S. Department of Defense, outlined the main theoretical insights for American policy-makers and officials: Computers can spill sensitive data and must be guarded (1960s); Computers can be attacked and data stolen (1970s); We can build computer attacks into military arsenals (1980s and 1990s); Others might do that to us – and perhaps already are (1990s). But new opportunities to exploit vulnerabilities make this a challenging field.
Responding to the Cyber Threat: A UK Military Perspective
In 2015 through the UK National Security Strategy and Strategic Defence Review, the Government recognised the growing threat to our national stability, security and prosperity from activities occurring in, and from, cyberspace.