Skip to main content

Ten National Cyber Security Strategies: A Comparison

  • Conference paper
Critical Information Infrastructure Security (CRITIS 2011)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 6983))

Abstract

A number of nations developed and published a national cyber security strategy (NCSS). Most of them were published in the period 2009 - 2011. Despite the fact that each of these NCSS intends to address the cyber security threat, large differences exist between the NCSS approaches. This paper analyses and compares the NCSS of Australia, Canada, Czech Republic, France, Germany, Japan, The Netherlands, New Zealand, the United Kingdom, and the United States. Thirteen observations lead to a set of conclusions which nations with an NCSS and developers of future NCSS may use to their advantage.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 49.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Rauscher, K.F., Yashenko, V. (eds.): Critical Technology Foundations. EastWest Institute, London (2011), http://www.ewi.info/system/files/reports/Russia-U%20S%20%20bilateral%20on%20terminology%20v76%20%282%29.pdf

  2. The White House, Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure, Washington, DC, USA (2010), http://www.whitehouse.gov/assets/documents/Cyberspace_Policy_Review_final.pdf

  3. European Commission, A Digital Agenda for Europe – COM(2010) 245 final/2, Brussels, Belgium (2010), http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:52010DC0245R(01):EN:NOT

    Google Scholar 

  4. Attorney General, Cyber Security Strategy, Australia (2009), http://www.ag.gov.au/www/agd/agd.nsf/Page/CyberSecurity_CyberSecurity#h2strategy

  5. Public Safety Canada, Canada’s Cyber Security Strategy: For a stronger and more prosperous Canada (2010), http://www.publicsafety.gc.ca/prg/ns/cybr-scrty/_fl/ccss-scc-eng.pdf

  6. Sécurité publique Canada, Stratégie de cybersécurité du Canada: Renforcer le Canada et accroître sa prospérité, Ottawa, Canada (2010), http://www.publicsafety.gc.ca/prg/ns/cybr-scrty/_fl/ccss-scc-fra.pdf

  7. Ministry of Interior, Cyber Security Strategy of the Czech Republic for the 2011-2015 period (Strategii pro oblast kybernetické bezpečnosti České republiky na období 2011-2015), Prague, Czech Republic (2011), http://www.enisa.europa.eu/media/news-items/CZ_Cyber_Security_Strategy_20112015.PDF

  8. Secrétariat général de la défense et de la sécurité nationale, Défense et sécurité des systèmes d’information: Stratégie de la France (2011), http://www.ssi.gouv.fr/IMG/pdf/2011-02-15_Defense_et_securite_des_systemes_d_information_strategie_de_la_France.pdf

  9. Secrétariat général de la défense et de la sécurité nationale, Défense et Sécurité nationale: Le Livre Blanc, Paris, France (2008), http://www.defense.gouv.fr/portail-defense/enjeux2/politique-de-defense/livre-blanc-2008

  10. Bundesministerium des Innern, Cyber Sicherheitsstrategie für Deutschland (2011), http://www.bmi.bund.de/SharedDocs/Downloads/DE/Themen/OED_Verwaltung/Informationsgesellschaft/cyber.pdf?__blob=publicationFile

  11. Federal Ministry of the Interior, Cyber Security Strategy for Germany, Germany (2011), http://www.cio.bund.de/SharedDocs/Publikationen/DE/Strategische-Themen/css_engl_download.pdf?__blob=publicationFile

  12. Information Security Strategy for Protecting the Nation, Information Security Policy Council, Tokyo, Japan (2010), http://www.nisc.go.jp/eng/pdf/New_Strategy_English.pdf

  13. The First National Strategy on Information Security: towards the realization of a trustworthy society, Information Security Policy Council, Tokyo, Japan (2006), http://www.nisc.go.jp/eng/pdf/national_strategy_001_eng.pdf

  14. Netherlands Ministry of Security and Justice, De Nationale Cyber Security Strategie: Slagkracht door samenwerking, The Hague, The Netherlands (2011), http://www.rijksoverheid.nl/bestanden/documenten-en-publicaties/rapporten/2011/02/22/nationale-cyber-security-strategie-slagkracht-door-samenwerking/de-nationale-cyber-security-strategie-definitief.pdf

  15. Netherlands Ministry of Security and Justice, The National Cyber Security Strategy (NCSS): Success through Cooperation, The Hague, Netherlands (2011), http://www.enisa.europa.eu/media/news-items/dutch-cyber-security-strategy-2011

  16. Ministry of Economic Development, New Zealand’s Cyber Security Strategy, New Zealand (2011), http://www.dpmc.govt.nz/dpmc/publications/nzcss

  17. Cabinet Office, Cyber Security Strategy of the United Kingdom: safety, security and resilience in cyber space, London, United Kingdom (2009), http://www.official-documents.gov.uk/document/cm76/7642/7642.pdf

  18. HM Government, The National Security Strategy Update 2009: Security for the Next Generation, London, United Kingdom (2009), http://www.official-documents.gov.uk/document/cm75/7590/7590.pdf

  19. HM Government, A Strong Britain in an Age of Uncertainty: The National Security Strategy, London, United Kingdom (2010), http://www.direct.gov.uk/prod_consum_dg/groups/dg_digitalassets/@dg/@en/documents/digitalasset/dg_191639.pdf?CID=PDF&PLA=furl&CRE=nationalsecuritystrategy

    Google Scholar 

  20. The National Strategy to Secure Cyberspace, The White House, USA (2003), http://www.us-cert.gov/reading_room/cyberspace_strategy.pdf

  21. http://lafiga.firedoglake.com/2011/06/03/finally-an-intelligent-use-for-cupcakes-hacking-terrorist-sites (last visited June 30, 2013)

  22. Council of Europe, Convention on Cybercrime, ETS No. 185 (2001), http://conventions.coe.int/Treaty/EN/Treaties/html/185.htm

  23. The White House, International Strategy for Cyberspace, Washington, DC, USA (2011), http://www.whitehouse.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Luiijf, H.A.M., Besseling, K., Spoelstra, M., de Graaf, P. (2013). Ten National Cyber Security Strategies: A Comparison. In: Bologna, S., Hämmerli, B., Gritzalis, D., Wolthusen, S. (eds) Critical Information Infrastructure Security. CRITIS 2011. Lecture Notes in Computer Science, vol 6983. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-41476-3_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-41476-3_1

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-41475-6

  • Online ISBN: 978-3-642-41476-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics