Cybersecurity

Resilience Management Framework for Critical Information Infrastructure: Designing the Level of Trust that Encourages the Exchange of Health Data

Cybernetic Approach to Developing Resilient Systems: Concept, Models and Application

Cybersecurity in Switzerland: Challenges and the Way Forward for the Swiss Armed Forces

Baezner, Marie. "Cybersecurity in Switzerland: Challenges and the Way Forward for the Swiss Armed Forces." Connections: The Quarterly Journal 19, no. 1 (2020): 63-72.

Policy Highlights

Like in any other European state, cybersecurity has grown in importance in Swiss politics. And although Switzerland’s cybersecurity and defense policies are still a work in progress, the nation has made tremendous efforts in getting cybersecurity policies, roles, and responsibilities right.

19.1.06_cybersecurity_switzerland.pdf — Downloaded 2992 times

Israel Defense Forces and National Cyber Defense

Tabansky, Lior. "Israel Defense Forces and National Cyber Defense." Connections: The Quarterly Journal 19, no. 1 (2020): 45-62.

Michael Warner, the Cyber Command Historian at the U.S. Department of Defense, outlined the main theoretical insights for American policy-makers and officials: Computers can spill sensitive data and must be guarded (1960s); Computers can be attacked and data stolen (1970s); We can build computer attacks into military arsenals (1980s and 1990s); Others might do that to us – and perhaps already are (1990s). But new opportunities to exploit vulnerabilities make this a challenging field.

19.1.05_cyber_defence_israel.pdf — Downloaded 3440 times

Responding to the Cyber Threat: A UK Military Perspective

Lester, Phil, and Sean Moore. "Responding to the Cyber Threat: A UK Military Perspective." Connections: The Quarterly Journal 19, no. 1 (2020): 39-44.

In 2015 through the UK National Security Strategy and Strategic Defence Review, the Government recognised the growing threat to our national stability, security and prosperity from activities occurring in, and from, cyberspace.

19.1.04_cyber_reponse_uk_military.pdf — Downloaded 2950 times

Pages