Abstract
This chapter analyses and compares CI(I)P and cybersecurity strategies to discover key issues, developments, and trends and to make recommendations about strategy making in the field of CIIP. To this end, it will first define CIP, CIIP and cybersecurity. It will then show what kind of protection goals – statements about a desired state of security of a particular object/asset that is seen in need of protection from one or a variety of threats – are defined and what kind of countermeasures are foreseen. Third, it will move from the content to the process and will make recommendations about how an optimal strategy process in the field of CIIP should look like.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Collier, S., Lakoff, A.: The Vulnerability of Vital Systems: How ‘Critical Infrastructure’ Became a Security Problem. In: Dunn Cavelty, M., Kristensen, K.S. (eds.) The Politics of Securing the Homeland: Critical Infrastructure, Risk and Securitisation, pp. 40–62. Routledge, London (2008)
Dunn Cavelty, M.: Cyber-Security. In: Burgess, P. (ed.) The Routledge Handbook of New Security Studies, pp. 154–162. Routledge, London (2010)
President’s Commission on Critical Infrastructure Protection. Critical Foundations. Protecting America’s Infrastructures, US Government Printing Office, Washington DC (1997)
Brunner, E.M., Suter, M.: International CIIP Handbook 2008/2009. Center for Security Studies, Zurich (2008)
Claudle, S.L.: National Security Strategies: Security from What, from Whom, and by What Means. Journal of Homeland Security and Emergency Management 6(1), 10 (2009)
Mintzberg, H., Ahlstrand, B., Lampel, J.: Strategy Safari: A Guided Tour Through the Wilds of Strategic Management, p. 9. The Free Press, New York (1998)
Schneider, V., Hyner, D.: Security in Cyberspace. In: Koenig-Archibougi, M., Zürn, M. (eds.) New Modes of Governance in the Global System. Exploring Publicness, Delegation and Inclusiveness, Palgrave MacMilllan, pp. 154–176 (2005)
US Government. Cyberspace Policy Review. Assuring a Trusted and Resilient Information and Communication Infrastructure. US Government Printing Office, Washington DC (2009)
Ministry of Defence of Estonia. Cyber Security Strategy. Cyber Security Strategy Committee, Tallinn, p. 8 (2008)
Cabinet Office of the United Kingdom. Cyber Security Strategy of the United Kingdom. Safety, Security and Resilience in Cyber Space. The Stationery Office, London, p. 9 (2009)
US Government, Cyberspace Policy Review, p. 2
Cornish, P., Hughes, R., Livingstone, D.: Cyberspace and the National Security of the United Kingdom. Threats and Responses. Chatham House, London (2009)
Homeland Security Council. National Strategy for Homeland Security. US Government Printing Office, Washington DC, p. 1 (2007)
Ibid, p. 26
Dutch Ministry of the Interior and Kingdom Relation. National Security Strategy and Work Programme 2007-2008. Broese & Peereboom, The Hague, p. 16 (2007)
Ibid, p.13
Her Majesty the Queen in Right of Canada. National Strategy for Critical Infrastructure. Public Safety Canada, Ottawa, p. 25 (2009)
Cabinet Office of the United Kingdom. The National Security Strategy of the United Kingdom. Security in an Interdependent World. The Stationery Office, London p. 5 (2008)
Ibid, p. 26
Department of Homeland Security. National Infrastructure Protection Plan. Partnering to Enhance Protection and Resiliency. Government Printing Office, Washington DC, p. 1 (2009)
Her Majesty the Queen in Right of Canada. National Strategy for Critical Infrastructure p. 1 (2008)
Australian Government. Critical Infrastructure Resilience Strategy. Commonwealth of Australia, Barton, pp. 3ff (2010)
Brunner, E., Giroux, J.: Resilience: A Tool for Preparing and Managing Emergencies. CSS Analyses in Security Policy, No. 60, p. 1 (2009)
For a complete list of the sector-specific agencies, see: Department of Homeland Security, National Infrastructure Protection Plan, p. 19
Other plans can be retrieved, http://www.dhs.gov/files/programs/gc_1179866197607.shtm
Department of Homeland Security. Information Technology. Critical Infrastructure and Key Resources Sector-Specific Plan as Input to the National Infrastructure Protection Plan. Government Printing Office, Washington DC, p. 11ff (2007)
Bundesministerium des Innern. Umsetzungsplan KRITIS des nationalen Plans zum Schutz der kritischen Informationsinfrastrukturen. Publikationsversand der Bundesregierung, Rostock (2007)
Cabinet Office of the United Kingdom, Cyber Security Strategy, pp. 12f
Swedish Civil Contingency Agency. Information Security in Sweden: Situational Assessment 2008. MSB, Karlstad, p. 3 (2008)
US Government, Cyberspace Policy Review, p. 2; Ministry of Defence of Estonia, Cyber Security Strategy of Estonia, p.10
US Government, Cyberspace Policy Review, p. 1
Swedish Civil Contingency Agency, Information Security in Sweden, p. 3
Cabinet Office of the United Kingdom , Cyber Security Strategy, pp. 14
US Government, Cyberspace Policy Review, p. 8
Ministry of Defence of Estonia, Cyber Security Strategy of Estonia, p.8
Ibid
Ibid.: p. vii
Cabinet Office of the United Kingdom, Cyber Security Strategy, pp. 12ff
Ministry of Defence of Estonia, Cyber Security Strategy of Estonia, p.10
Swedish Civil Contingency Agency, Information Security in Sweden, p. 17
Ministry of Defence of Estonia, Cyber Security Strategy of Estonia, p.17
Cabinet Office of the United Kingdom, Cyber Security Strategy, p. 12; Ministry of Defence of Estonia, Cyber Security Strategy of Estonia, p.10; Swedish Civil Contingency Agency, Information Security in Sweden, p. 17
President’s Commission on Critical Infrastructure Protection, Critical Foundations, p. x
US Government, Cyberspace Policy Review, p. 18
Dunn Cavelty, M., Suter, M.: Public-Private Partnerships are no Silver Bulled: An Expanded Governance Model For Critical Infrastructure Protection. International Journal of Critical Infrastructure Protection 2(4), 179–187 (2009)
US Government, Cyberspace Policy Review, p. 38
Commission of the European Communities. Protecting Europe from Large Scale Cyber-attacks and Disruptions: Enhancing Preparedness, Security and Resilience. Communication from the Commission to the European Parliament, the Council, the European Economic and Social Committee and the Committee of Regions, Brussels, p. 6. (2009)
Ministry of Defence of Estonia, Cyber Security Strategy of Estonia, p.15
Cabinet Office of the United Kingdom , Cyber Security Strategy, p. 9
Obama followed this suggestion and appointed Howard Schmidt as the first cybersecurity coordinator of the White House in December 2009. Cf. The White House Blog (December 22, 2009), http://www.whitehouse.gov/blog/2009/12/22/introducing-new-cybersecurity-coordinator
Up to now (Spring 2010) this center is still planned but not yet implemented. Cf. Infosecurity Magazine (March 12 2010), http://www.infosecurity-magazine.com/view/8020/uk-government-cyber-security-operations-centre-going-live-soon/
Cabinet Office of the United Kingdom , Cyber Security Strategy, p. 16
President’s Commission on Critical Infrastructure Protection, Critical Foundations, p. xi
US Government, Cyberspace Policy Review, pp. 13f
Cabinet Office of the United Kingdom, Cyber Security Strategy, p. 18
Ministry of Defence of Estonia, Cyber Security Strategy of Estonia, p. 34
Portnoy, M., Goodman, S.: Global Initiatives to Secure Cyberspace. An Emerging Landscape. Springer, New York (2009)
NATO Parliamentary Assembly. NATO and Cyber Defence. Committee Report of the 2009 Annual Session, Bruxelles, §38 (2009)
Such as, e.g: Department of Homeland Security. Homeland Security Presidential Directive 7: Critical Infrastructure Identification, Prioritization and Protection. US Government Printing Office, Washington DC (2003)
Ann Brown, K.: Critical Path. A Brief History of Critical Infrastructure Protection in the, p. 82. George Mason University, Washington DC (2006)
https://www.navi-online.nl/content/24/SOVI+werkgroep (in Dutch)
Bundesministerium des Innern, Umsetzungsplan KRITIS.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Dunn Cavelty, M., Suter, M. (2012). The Art of CIIP Strategy: Tacking Stock of Content and Processes. In: Lopez, J., Setola, R., Wolthusen, S.D. (eds) Critical Infrastructure Protection. Lecture Notes in Computer Science, vol 7130. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-28920-0_2
Download citation
DOI: https://doi.org/10.1007/978-3-642-28920-0_2
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-28919-4
Online ISBN: 978-3-642-28920-0
eBook Packages: Computer ScienceComputer Science (R0)