ebook img

Routledge Companion to Global Cyber-Security Strategy PDF

657 Pages·2021·12.539 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Routledge Companion to Global Cyber-Security Strategy

ROUTLEDGE COMPANION TO GLOBAL CYBER-SECURITY STRATEGY This companion provides the most comprehensive and up-to-date comparative overview of the cyber-security strategies and doctrines of the major states and actors in Europe, North America, South America, Africa, and Asia. The volume offers an introduction to each nation’s cyber-security strategy and policy, along with a list of resources in English that may be consulted for those wishing to go into greater depth. Each chapter is written by a leading academic or policy specialist, and contains the following sections: (cid:129) overview of national cyber-security strategy; (cid:129) concepts and definitions; (cid:129) exploration of cyber-security issues as they relate to international law and governance; (cid:129) critical examinations of cyber partners at home and abroad; (cid:129) legislative developments and processes; (cid:129) dimensions of cybercrime and cyberterrorism; (cid:129) implications of cyber-security policies and strategies. This book will be of much interest to students and practitioners in the fields of cyber- security, national security, strategic studies, foreign policy, and international relations. Scott N. Romaniuk is a Postdoctoral Research Fellow in Security Studies at the China Institute, University of Alberta, Canada, and a Visiting Fellow at the International Centre for Policing and Security, University of South Wales, UK. Mary Manjikian is Associate Dean of the Robertson School of Government at Regent University, USA. ROUTLEDGE COMPANION TO GLOBAL CYBER-SECURITY STRATEGY Edited by Scott N. Romaniuk and Mary Manjikian Firstpublished2021 byRoutledge 2ParkSquare,MiltonPark,Abingdon,OxonOX144RN andbyRoutledge 52VanderbiltAvenue,NewYork,NY10017 RoutledgeisanimprintoftheTaylor&FrancisGroup,aninformabusiness ©2021selectionandeditorialmatter,ScottN.RomaniukandMaryManjikian;individualchapters,the contributors TherightofScottN.RomaniukandMaryManjikiantobeidentifiedastheauthorsoftheeditorialmaterial, andoftheauthorsfortheirindividualchapters,hasbeenassertedinaccordancewithsections77and78ofthe Copyright,DesignsandPatentsAct1988. Allrightsreserved.Nopartofthisbookmaybereprintedorreproducedorutilisedinanyformorbyany electronic,mechanical,orothermeans,nowknownorhereafterinvented,includingphotocopyingand recording,orinanyinformationstorageorretrievalsystem,withoutpermissioninwritingfromthepublishers. Trademarknotice:Productorcorporatenamesmaybetrademarksorregisteredtrademarks,andareusedonlyfor identificationandexplanationwithoutintenttoinfringe. BritishLibraryCataloguing-in-PublicationData AcataloguerecordforthisbookisavailablefromtheBritishLibrary LibraryofCongressCataloging-in-PublicationData Names:Romaniuk,ScottN,1979-editor.|Manjikian,Mary,editor. Title:Routledgecompaniontoglobalcyber-securitystrategy/ScottNRomaniuk,MaryManjikian. Description:NewYork:Routledge,2020.|Includesbibliographicalreferencesandindex. Identifiers:LCCN2020024629(print)|LCCN2020024630(ebook)|ISBN9780367024239(hardback)| ISBN9780429399718(ebook) Subjects:LCSH:Cyberspace–Securitymeasures–Governmentpolicy.|Cyberterrorism–Prevention–Government policy.|Computercrimes–Prevention–Governmentpolicy.|Computersecurity–Governmentpolicy.| Internet–Securitymeasures–Governmentpolicy.|Computernetworks–Securitymeasures–Governmentpolicy. Classification:LCCUA163.R682020(print)|LCCUA163(ebook)|DDC363.325–dc23 LCrecordavailableathttps://lccn.loc.gov/2020024629 LCebookrecordavailableathttps://lccn.loc.gov/2020024630 ISBN:978-0-367-02423-9(hbk) ISBN:978-0-429-39971-8(ebk) TypesetinBembo byRiverEditorialLtd,Devon,UK CONTENTS Listoffigures x Listoftables xi Listofcontributors xii Foreword:Globalcybersecurityinthe21stcenturybyBrig.Gen.StevenJ.Spano xxii Introduction:cybersecuritystrategyandpolicyinacomparativecontext 1 MaryManjikianandScottN.Romaniuk PARTI Europe 9 1 Securingthekingdom’scyberspace:cybersecurityandcyber intelligenceinSpain 11 RubénArcos 2 Albania’scybersecuritypivot:betweenWesternarchitecturesand greatpowercompetition 26 AlexanderFotescuandMihaiChihaia 3 Armeniannationalpolicyincyberspace:towardaglobalcyber securityarchitecture 36 RubenElamiryan 4 CzechRepublic:anewcybersecurityleaderinCentralEurope 51 LucieKadlecováandMichaelaSemecká v Contents 5 CybersecurityintheFrenchRepublic 62 AmberDarwishandScottN.Romaniuk 6 Germany’scybersecuritystrategy:confrontingfuturechallenges 73 ScottN.RomaniukandMichaelClaus 7 CybersecurityofPoland:legalandorganizationalframework 89 DominikaDziwisz 8 Hungary’sevolvingcybersecuritystrategy 99 AnnamáriaBelázandDánielBerzsenyi 9 Romaniancybersecurityefforts:aworkinprogress 111 Oana-ElenaBrânda 10 Italy’scybersecurityarchitectureandcriticalinfrastructure 121 TommasoDeZan,GiampieroGiacomello,andLuigiMartino 11 Dutchcybersecuritystrategy 132 JoostBunkandMaxSmeets 12 Norwegiancybersecurity:asmall-stateapproachtobuilding internationalcybercooperation 143 LarsGjesvik 13 Seekinganeworderforglobalcybersecurity:theRussianapproachto cyber-sovereignty 153 IlonaStadnik 14 Slovakia:theTatraTigerwithoutteeth 165 AaronT.Walter 15 Slovenia:afragmentedcybersecurity 176 LarisGaiser 16 InthelineofRussianUkraine,hybridwarfare,andcybersecurity defenseaggression:Ukraine,hybridwarfare,andcybersecuritydefense 185 OlyaZaporozhetsandOleksiySyvak 17 UnitedKingdom:pragmatismandadaptabilityinthecyberrealm 191 TimStevens 18 EuropeanUnion:policy,cohesion,andsupranationalexperiences withcybersecurity 201 ChristopherWhyte vi Contents 19 Estonia:fromthe“BronzeNight”tocybersecuritypioneers 211 NickRobinsonandAlexHardy 20 NATO’sevolvingcybersecuritypolicyandstrategy 226 ScottN.Romaniuk,AlexanderFotescu,andMihaiChihaia PARTII AsiaandAustralia 249 21 Japan’schallenges,capabilities,andpreparednessincyberspace 251 TobiasBurgers,ScottN.Romaniuk,andCherryH.Y.Wong 22 Aneffectiveshield?AnalyzingSouthKorea’scybersecuritystrategy 267 YangmoKu 23 Inthelineoffire:Taiwan’slegal,political,andtechnological cybersecurityposture 276 TobiasBurgers,MoritzHellmann,andScottN.Romaniuk 24 Servingthepeople:China’scybersecuritypolicyanditsimplications 284 YuChengChen,TonyTai-TingLiu,andScottN.Romaniuk 25 Cybersecurityinaone-partystate:policiesandimplicationsfor Vietnam’seconomyandonlinefreedom 297 PhanLe 26 ThePhilippines’cybersecuritystrategy:strengtheningpartnershipsto enhancecybersecuritycapability 315 AmparoPamelaH.FabeandEllaZarcilla-Genecela 27 Malaysia:balancingnationaldevelopment,nationalsecurity,and cybersecuritypolicy 325 AhmadEl-Muhammady 28 CybergovernanceanddataprotectioninIndia:acriticallegalanalysis 337 DebaratiHalderandK.Jaishankar 29 Cybersecurity:anationalpriorityforBangladesh 349 Md.SharifulIslam 30 Managingadigitalrevolution:cybersecuritycapacitybuildingin Myanmar 356 NielsNagelhusSchiaandLarsGjesvik vii Contents 31 Australia’scybersecurity:auniqueopportunity 367 AnaStuparu 32 Singapore:aleadingactorinASEANcybersecurity 381 BenjaminAng PARTIII TheMiddleEast 393 33 Betweenmulti-stakeholderismandcybersovereignty:understanding Turkey’scybersecuritystrategy 395 TubaEldem 34 Israel:cyberdefenseandsecurityasnationaltrademarksof internationallegitimacy 409 FabioCristiano 35 Palestine:whosecybersecuritywithoutcybersovereignty? 418 FabioCristiano 36 The“SiliconValleyoftheMiddleEast”:cybersecurity,SaudiArabia, andthepathtoVision2030 427 AnwarOuassiniandKimeuW.Boynton 37 TheIslamicRepublicofIran’scybersecuritystrategy:challengesinan eraofcyberuncertainty 435 FilizKatman PARTIV TheAmericas 449 38 Canada’scybersecurityinaglobalizedenvironment:challengesand opportunities 451 KawserAhmed 39 TheUnitedStates:adeclininghegemonincyberspace? 463 MaryManjikian 40 Jamaica’scybercrimeandcyber-security:policies,laws,andstrategies 473 SuzetteA.Haughton 41 Mexicoandcybersecurity:policies,challenges,andconcerns 484 SaúlMauricioRodriguez-HernandezandNicolásVelásquez viii Contents 42 Colombia’scybersecuritypredicament:statemaking,strategic challenges,andcyberspace 494 FlorentFrasson-QuenozandCésarAugustoNiñoGonzález 43 CybersecuritygovernanceinBrazil:keepingsilosorbuildingbridges? 504 LouiseMarieHurelandLuisaCruzLobato PARTV Africa 519 44 SecuritizingcyberspaceinEgypt:thedilemmaofcybersecurityand democracy 521 BassantHassibandNardineAlnemr 45 SecuritythroughtheArabWinter:cyberstrategiesinpost- revolutionaryTunisia 534 NabilOuassini 46 CybersecurityinKenya:balancingeconomicsecurityandinternet freedom 543 JamesD.Fielder 47 CybersecuritypolicyinNigeria:atoolfornationalsecurityand economicprosperity 553 AdewunmiJ.Falode 48 CybersecurityinGhana:past,present,andfuture 564 AnwarOuassiniandMostafaAmini 49 BuildingacyberfortressinAfrica:Uganda’scybersecuritycapacities andchallenges 573 ScottN.RomaniukandDavidAndrewOmona 50 CybersecurityinSouthAfrica:status,governance,andprospects 591 RaymondSteenkampFonsecaandJo-AnsievanWyk 51 Algorithmsofoppression?AU’scybersecuritypolicyandits enforcementinAfrica 608 JoshuaOreoluwaAkintayo Index 623 ix

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.