An International Comparative Study on Cyber Security Strategy

被引:14
作者
Min, Kyoung-Sik [1 ]
Chai, Seung-Woan [1 ]
Han, Mijeong [1 ]
机构
[1] Korea Internet & Secur Agcy, Seoul, South Korea
来源
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS | 2015年 / 9卷 / 02期
关键词
Network security - Deregulation - Internet of things - Big data;
D O I
10.14257/ijsia.2015.9.2.02
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
It is expected that utilization and expansion of cyber-space on the basis of big data, cloud computing and IoT(Internet of Things) will be a critical factor which determines national competitiveness. In the meantime, cyber threat accompanied by the utilization of cyber space, attacks targeting cyber space, became enhanced and complicated. Besides this, attackers were also more organized with economic and political intention. As a result, damage caused by the attacks targeting cyber-space has already brought about social confusion. This paper analyzes various countries' cyber security strategy by focusing on public-private partnership, which is one of the common grounds of the strategies. Especially, it focuses on how each country establishes institutional framework of the partnership related to infra-protection. The subject of analysis is limited to U.S.A, EU and Japan. Consequently, the countries, to some degree, adopt intervention policy through cyber security strategy, and government control is changing from voluntary self-regulation to enforced self-regulation in general. Additionally, public-partnership is more and more emphasized.
引用
收藏
页码:13 / 19
页数:7
相关论文
共 8 条
[1]  
Anderson J.J, 2007, INT J CRITICAL INFRA, V1, P6
[2]  
[Anonymous], NAT CYB SEC STRAT PR
[3]   Cybersecurity: Stakeholder incentives, externalities, and policy options [J].
Bauer, Johannes M. ;
van Eeten, Michel J. G. .
TELECOMMUNICATIONS POLICY, 2009, 33 (10-11) :706-719
[4]   Public-Private Partnerships are no silver bullet: An expanded governance model for Critical Infrastructure Protection [J].
Dunn-Cavelty, Myriam ;
Suter, Manuel .
INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2009, 2 (04) :179-187
[5]  
ENISA, 2010, INC CHALL INF SHAR C
[6]  
ENISA, 2012, NAT CYB SEC STRAT SE
[7]  
Irion K., 2012, SECURE INFORM SOC
[8]   Nineteen national cyber security strategies [J].
Luiijf, Eric ;
Besseling, Kim .
INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURES, 2013, 9 (1-2) :3-31