Cybersecurity
Cybersecurity in Switzerland: Challenges and the Way Forward for the Swiss Armed Forces
Policy Highlights
Like in any other European state, cybersecurity has grown in importance in Swiss politics. And although Switzerland’s cybersecurity and defense policies are still a work in progress, the nation has made tremendous efforts in getting cybersecurity policies, roles, and responsibilities right.

Israel Defense Forces and National Cyber Defense
Michael Warner, the Cyber Command Historian at the U.S. Department of Defense, outlined the main theoretical insights for American policy-makers and officials: Computers can spill sensitive data and must be guarded (1960s); Computers can be attacked and data stolen (1970s); We can build computer attacks into military arsenals (1980s and 1990s); Others might do that to us – and perhaps already are (1990s). But new opportunities to exploit vulnerabilities make this a challenging field.

Responding to the Cyber Threat: A UK Military Perspective
In 2015 through the UK National Security Strategy and Strategic Defence Review, the Government recognised the growing threat to our national stability, security and prosperity from activities occurring in, and from, cyberspace.

Austria’s National Cyber Security and Defense Policy: Challenges and the Way Forward
Policy Highlights: Austria’s National Military Cyber Defense Policy Within a Whole-of-Government Context
The “Austrian Security Strategy: Security for a New Decade – Shaping Security,” adopted by the Austrian National Council in 2013 (ÖSS 2013) was followed in the same year by the “Austrian Cyber Security Strategy” (ÖSCS 2013), which was produced in accordance with the ÖSS. Both documents were developed at the national level.

Cyber Defence in Germany: Challenges and the Way Forward for the Bundeswehr
Policy Highlights
In Germany, the provision of cybersecurity—i.e. a condition where risks from cyberspace have been reduced to an acceptable minimum—is a whole-of-government task. This is laid down in the 2016 White Paper, the current basic document on German security policy. There are few areas where internal and external security are as closely intertwined as they are in cyberspace. This includes the joint protection of critical infrastructure.

National Cyber Defence Policies and the Role of International Cooperation
Digitalization has made our societies vulnerable to cyber threats – from electric grids to elections. This is also true for militaries, and cyber defence has become a natural task for all defence organizations. Cyber threats cannot be considered as new threats anymore. However, the cyber threat landscape is changing rapidly, and will continue to do so. Malicious viruses, hackers, hacking, etc., are still part of this landscape, but cyber weapons and cyberattacks originating from nation states are the primary security concerns today.

Towards the Design of a Collaborative Cybersecurity Networked Organisation: Identification and Prioritisation of Governance Needs and Objectives

The System of Operative Determination of the Level of Tension in Society Based on Data from Social Networks

Diffusion of Information in an Online Social Network with Limited Attention

Integrated Model of Knowledge Management for Security of Information Technologies: Standards ISO/IEC 15408 and ISO/IEC 18045
