System Approach to Coherent Cybersecurity Strategy
PDF

Keywords

cybersecurity
cyber defense,
system approach,
cyber defense strategies
cybersecurity strategies

How to Cite

MICHALSKI, D. (2019). System Approach to Coherent Cybersecurity Strategy. Safety & Defense, 5(1), 31-36. https://doi.org/10.37105/sd.39

Abstract

Cyber-attacks affect not only our daily lives, but also national security by influencing elections, the economy, and communication. This article is an attempt to give an answer to the question included in the topic “How to build a coherent cybersecurity strategy?”. The first part of the article addresses the paradigmatic issue of cybersecurity. The author shows the differences and relations between cybersecurity and cyber defense. At this point, the author presents a systems approach to the nation security and related it to the cybersecurity. The second part of the article has been dedicated to visualize the need of coherent cybersecurity strategy by analyzing data related to cybersecurity. In the end, the author proposes actions to achieve cybersecurity. This has been done based on existing analyzes of cybersecurity strategies and systems approach to the issue of the cybersecurity.

https://doi.org/10.37105/sd.39
PDF

References

[1] Strategia Obronności Rzeczypospolitej Polskiej. Warszawa 2009.
[2] Doktryna cyberbezpieczeństwa Rzeczypospolitej Polskiej, Warszawa 2015.
[3] Bujek, M. (2018). Cybersecurity as the basis for state and society security in the 21st century. Safety&Defense.
[4] Cyfryzacji, M.A. (2013). Polityka Ochrony Cyberprzestrzeni Rzeczypospolitej Polskiej. Warszawa.
[5] Dimitar Stevo Bogatinov, M. B. (2016). Handbook of Research on Civil Society and National Security in the Era of Cyber Warfare. Macedonia.
[6] Ecpiuniversity. (2017). ecpi university. https://www.ecpi.edu/blog/ what-is-cyber-defense
[7] ECybersecurity Strategy of the European Union: An Open, Safe and Secure Cyberspace. Brussels: European Union 2013.
[8] European Cybersecurity Forum. (2017). The 3rd Annual Public Policy Conference dedicated to strategic aspects of cybersecurity. Cybersec2017, (str. 24). Kraków, Poland.
[9] Jim Finkle, D.C. (2018, April 16). https://www.reuters.com/article/ us-usa-britain-cyber/u-s-britain-blame-russia-for-global-cyber-attack-idUSKBN1HN2CK
[10] Koziej, S. (2011). Bezpieczeństwo: istota, podstawowe. Polityczno- Strategiczne Aspekty Bezpieczeństwa.
[11] Laprus, M. (1979). Leksykon wiedzy wojskowej. Warszawa: Ministerstwo Obrony Narodowej.
[12] Nan Tian, A.F. (2017). Trends in world military,2016. SIPRI Fact Sheet.
[13] Strategia Bezpieczeństwa Narodowego. Warszawa 2014.
[14] NICCS. (2018, 08 18). National Initiative For Cybersecurity Careers And Studies. https://niccs.us-cert.gov/
[15] Oxford. (2017). oxforddictionaries. https://en.oxforddictionaries. com/definition/security
[16] Ranger, S. (2017, January 05). ZDnet. Pobrano z lokalizacji https:// www.zdnet.com/article/us-intelligence-30-countries-building-cyber-
attack-capabilities/
[17] Symantec. (2018). Norton Cyber Security Insights Report Global Results. Mountain View: Symantec Corporation.
[18] U.S. Homeland Security. (2003). The National Strategy to Secure Cyberspace. Washington
Creative Commons License

This work is licensed under a Creative Commons Attribution 4.0 International License.