Skip to main content

Introduction

  • Chapter
  • First Online:
Cybersecurity in France

Part of the book series: SpringerBriefs in Cybersecurity ((BRIEFSCYBER))

  • 898 Accesses

Abstract

This chapter gives a general overview of this monograph and provides an executive summary of its findings.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Full text available at: http://www.ampere.cnrs.fr/textes/essaiphilosophie/pdf/essaiphilosophiesciences_1.pdf.

  2. 2.

    https://ccdcoe.org/cyber-definitions.html.

  3. 3.

    http://www.ladocumentationfrancaise.fr/var/storage/rapports-publics/084000341.pdf.

  4. 4.

    «Les moyens d’information et de communication sont devenus les systèmes nerveux de nos sociétés, sans lesquels elles ne peuvent plus fonctionner. Or le «cyberespace», constitue par le maillage de l’ensemble des réseaux, est radicalement différent de l’espace physique: sans frontière, évolutif, anonyme, l’identification certaine d’un agresseur y est délicate» (p. 53).

  5. 5.

    «L’efficacité à tous niveaux des forces de défense et de sécurité dépend et dépendra de plus en plus du bon fonctionnement de leurs systèmes d’information. La planification et l’exécution d’opérations combinées avec des actions cybernétiques tendent en effet à devenir la norme. Avant même que des cibles physiques ne soient détruites, tout système de défense pourra être en effet désorganisé et partiellement aveuglé au travers de frappes silencieuses et ciblées».

  6. 6.

    https://www.ssi.gouv.fr/en/.

  7. 7.

    Luiijf et al. (2011).

  8. 8.

    ENISA—National cyber security strategies resource centre: https://www.enisa.europa.eu/topics/national-cyber-security-strategies/ncss-map?tab=details.

  9. 9.

    See Steve blank, «The secret history of the Silicon Valley», presentation at UC Berkeley Haas School of Business, Nov. 20, 2008 and associated materials at: https://steveblank.com/secret-history/#Secret%20History%20Backstory.

  10. 10.

    See Baumard (1994) and also Stein (1996).

  11. 11.

    See: Arquilla and Ronfeldt (2003) and In Athena’s Camp: Preparing for Conflict in the Information Age, RAND Corporation, 1997. http://www.rand.org/pubs/monograph_reports/MR880.html.

  12. 12.

    Baumard (2000).

  13. 13.

    Dearth and Williamson (1996): 25.

  14. 14.

    Baumard (1993).

  15. 15.

    Arquilla (1994).

  16. 16.

    Grinyer and Norburn (1975).

  17. 17.

    Starbuck (1992).

  18. 18.

    See Schudel and Wood (2000) and Van Leeuwen et al. (2015).

  19. 19.

    Dahl (1996).

  20. 20.

    Ibid., p. 128.

  21. 21.

    The original text is available on the Internet Archive at: https://archive.org/stream/Misc-DoD/Joint%20Pub%203-13-Joint%20Doctrine%20for%20Information%20Operations_djvu.txt.

  22. 22.

    Table extract from Baumard (2000).

  23. 23.

    For a thorough analysis, see Deppe (2005).

  24. 24.

    This principal of inseparability between public information, the Russian people and the State would become the main obstacle for the cooperation of Russia within the international legal framework of the Budapest Convention, a year later, in 2001. The Treaty was never ratified by Russia.

  25. 25.

    Russian Information Security Doctrine, Sept. 9, 2000. Translation and quote from K.M. Deppe, op.cit., p. 26.

  26. 26.

    The new Information Security Doctrine of Russia was enacted on December 5, 2016, revoking the Sept 9, 2000 Pr—1895 framework. It enlarges the initial concept of information security to include: “n this doctrine under the information sphere is understood collection of information, facilities information, information systems and websites in the information and telecommunication network “Internet” (Hereinafter—the “Internet” network), communications networks, information technology, entities, which activity is connected with the formation and information processing, development and use of these technology, information security, as well as the totality of the relevant public regulation mechanisms relationship.”

  27. 27.

    This information was breached in Fireye’s report on APT1, and denied by Chinese authorities. https://www.fireeye.com/content/dam/fireeye-www/services/pdfs/mandiant-apt1-report.pdf.

  28. 28.

    Mandiant/Fireye’ APT1 report, op. cit., p. 3. According to the report: “In 1849 of the 1905 (97%) of the Remote Desktop sessions APT1 conducted under our observation, the APT1 operator’s keyboard layout setting was “Chinese (Simplified)—US Keyboard”. Microsoft’s Remote Desktop client configures this setting automatically based on the selected language on the client system. Therefore, the APT1 attackers likely have their Microsoft operating system configured to display Simplified Chinese fonts. 817 of the 832 (98%) IP addresses logging into APT1 controlled systems using Remote Desktop resolved back to China” ibid., p. 24.

  29. 29.

    Goodman (2010).

References

  • Arquilla J (1994) The strategic implications of strategic dominance. Strateg Rev 22(3):24–30

    Google Scholar 

  • Arquilla J, Ronfeldt D (2003) Networks and netwars: The Future of Terror, Crime and Militancy, RAND Corporation

    Google Scholar 

  • Baumard Ph (1993) From noticing to making sense: using intelligence to develop strategy. Int J Intel Counterintelligence 7(1):29–73

    Article  Google Scholar 

  • Baumard Ph (1994) From information warfare to knowledge warfare: preparing for the paradigm shift. In: Schwartau W (ed) Information warfare. Thunder’s Mouth Press, New York, pp 611–626

    Google Scholar 

  • Baumard Ph (2000) From inertia warfare to cognitive warfare: economics of force in cognitive arenas. Martial ecologies: towards a new strategic discourse, Tel Aviv, May 30, conference proceedings, organized by Tel Aviv University and the Jaffee Center for Strategic Studies

    Google Scholar 

  • Dahl AB (1996) Command dysfunction: minding the cognitive war, a thesis presented to the faculty of the school of advanced airpower studies. Maxwell Air force Base, Alabama

    Google Scholar 

  • Dearth DH, Williamson CA (1996) Information age, information war: where are we in history? In: Campen AD, Dearth DH, Goodden RT (eds) Cyberwar: security, strategy and conflict in the information age, fairfax. AFCEA, VA

    Google Scholar 

  • Deppe KM (2005) The media and democracy in Russia, Ph Dissertation, Naval Postgraduate School, Monterey, CA, June, pp 25–30

    Google Scholar 

  • Goodman W (2010) Cyber deterrence: tougher in theory than in practice? Strateg Stud Q Fall pp 102–135

    Google Scholar 

  • Grinyer PH, Norburn D (1975) Planning for existing markets: perceptions of executives and financial performance. J R Stat Soc Ser A 138:336–372

    Google Scholar 

  • Luiijf H, Besseling K, Spoelstra M, de Graaf P (2011) Ten national cyber security strategies: a comparison. In: CRITIS 2011—6th international conference on critical information infrastructures security

    Google Scholar 

  • Schudel G, Wood B (2000) Adversary work factor as a metric of information assurance. Proceedings of the workshop on new security paradigms pp 23–30

    Google Scholar 

  • Starbuck WH (1992) Strategizing in the real world. Int J Technol manag Spec Publ Technol Found Strateg Manage 8(1/2)

    Google Scholar 

  • Stein G (1996) US Information Warfare. Jane’s Information Group, NY

    Google Scholar 

  • Van Leeuwen B, Stout WMS, Urias V (2015) Operational cost of deploying moving target defenses defensive work factors. Military communications conference, MILCOM IEEE

    Book  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Philippe Baumard .

Rights and permissions

Reprints and permissions

Copyright information

© 2017 The Author(s)

About this chapter

Cite this chapter

Baumard, P. (2017). Introduction. In: Cybersecurity in France. SpringerBriefs in Cybersecurity. Springer, Cham. https://doi.org/10.1007/978-3-319-54308-6_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-54308-6_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-54306-2

  • Online ISBN: 978-3-319-54308-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics