Concepts and principles of cyber security strategies

Research output: Contribution to journalArticle

6 Citations (Scopus)

Abstract

In the last few decades, the understanding of security has been changing. New areas emerged which may influence security facets, which were not urgent earlier. Now those facets can endanger individual persons or even states. Breaches of cyber security, separate attacks or intense cyber wars are becoming more usual than conventional wars in the physical space; violations of cyber security may cause great damage, ruin businesses or even temporarily paralyze full-fledged functioning of individual states or regions. Many countries of the world, realizing that such a threat is real, adopted Cyber Security Strategies; for some countries, this is not the first version of such a strategy. This article examines the place of Cyber Security Strategies in the system of state documents, the nature and importance of such strategies as well as whether they are binding on individuals and institutions. The article explores in more detail the principles of ensuring cyber security provided for in such strategies, i.e. the principles identified by the states, as important for ensuring cyber security. It is discussed why these principles are so different in the strategies of individual states.
Original languageEnglish
Pages (from-to)197-210
JournalJournal of Security and Sustainability Issues
Volume6
Issue number2
DOIs
Publication statusPublished - 2016

Fingerprint

damages
threat
cause
human being

Keywords

  • Concepts
  • Cyber security
  • Principles

Cite this

@article{c2c0b9e9b9754b2e88966839d29ef20e,
title = "Concepts and principles of cyber security strategies",
abstract = "In the last few decades, the understanding of security has been changing. New areas emerged which may influence security facets, which were not urgent earlier. Now those facets can endanger individual persons or even states. Breaches of cyber security, separate attacks or intense cyber wars are becoming more usual than conventional wars in the physical space; violations of cyber security may cause great damage, ruin businesses or even temporarily paralyze full-fledged functioning of individual states or regions. Many countries of the world, realizing that such a threat is real, adopted Cyber Security Strategies; for some countries, this is not the first version of such a strategy. This article examines the place of Cyber Security Strategies in the system of state documents, the nature and importance of such strategies as well as whether they are binding on individuals and institutions. The article explores in more detail the principles of ensuring cyber security provided for in such strategies, i.e. the principles identified by the states, as important for ensuring cyber security. It is discussed why these principles are so different in the strategies of individual states.",
keywords = "Concepts, Cyber security, Principles",
author = "Darius Štitilis and Paulius Pakutinskas and {Malinauskaitė-van de Castel}, Inga and Kinis Uldis",
year = "2016",
doi = "10.9770/jssi.2016.6.2(1)",
language = "English",
volume = "6",
pages = "197--210",
journal = "Journal of Security and Sustainability Issues",
issn = "2029-7017",
number = "2",

}

TY - JOUR

T1 - Concepts and principles of cyber security strategies

AU - Štitilis, Darius

AU - Pakutinskas, Paulius

AU - Malinauskaitė-van de Castel, Inga

AU - Uldis, Kinis

PY - 2016

Y1 - 2016

N2 - In the last few decades, the understanding of security has been changing. New areas emerged which may influence security facets, which were not urgent earlier. Now those facets can endanger individual persons or even states. Breaches of cyber security, separate attacks or intense cyber wars are becoming more usual than conventional wars in the physical space; violations of cyber security may cause great damage, ruin businesses or even temporarily paralyze full-fledged functioning of individual states or regions. Many countries of the world, realizing that such a threat is real, adopted Cyber Security Strategies; for some countries, this is not the first version of such a strategy. This article examines the place of Cyber Security Strategies in the system of state documents, the nature and importance of such strategies as well as whether they are binding on individuals and institutions. The article explores in more detail the principles of ensuring cyber security provided for in such strategies, i.e. the principles identified by the states, as important for ensuring cyber security. It is discussed why these principles are so different in the strategies of individual states.

AB - In the last few decades, the understanding of security has been changing. New areas emerged which may influence security facets, which were not urgent earlier. Now those facets can endanger individual persons or even states. Breaches of cyber security, separate attacks or intense cyber wars are becoming more usual than conventional wars in the physical space; violations of cyber security may cause great damage, ruin businesses or even temporarily paralyze full-fledged functioning of individual states or regions. Many countries of the world, realizing that such a threat is real, adopted Cyber Security Strategies; for some countries, this is not the first version of such a strategy. This article examines the place of Cyber Security Strategies in the system of state documents, the nature and importance of such strategies as well as whether they are binding on individuals and institutions. The article explores in more detail the principles of ensuring cyber security provided for in such strategies, i.e. the principles identified by the states, as important for ensuring cyber security. It is discussed why these principles are so different in the strategies of individual states.

KW - Concepts

KW - Cyber security

KW - Principles

U2 - 10.9770/jssi.2016.6.2(1)

DO - 10.9770/jssi.2016.6.2(1)

M3 - Article

VL - 6

SP - 197

EP - 210

JO - Journal of Security and Sustainability Issues

JF - Journal of Security and Sustainability Issues

SN - 2029-7017

IS - 2

ER -