Cyber-Security Policies of East European Countries
In modern times, ensuring security in cyberspace is the main task of national security for most states. States have different approaches to cybersecurity from the aspect of national security policies. They can be divided into two categories: those that regard cybersecurity as a civilian task and those that involve their militaries in creating or implementing cybersecurity policies. Those states that have incorporated cyber warfare into their military planning and organization perceive cyberattacks as a threat to their national security, while states that charge their civilian agencies with domestic cybersecurity missions classify cyber intrusions as security risks for only particular sectors. Adopting the framework of securitization theory, this chapter theorizes both civil and military approaches to cybersecurity and threat perceptions and their sources. The theoretical framework is then applied to a study of the cybersecurity policies of Eastern European countries and the Baltic states.
KeywordsCybersecurity Cyber space National security
- Anderson, R. H., & Anthony, H. (1996). An exploration of cyberspace security R&D investment strategies for DARPA: “The day after… in cyberspace II”.Google Scholar
- Butrimas, V. (2015). National security and international policy challenges in a post Stuxnet world. Lithuanian Annual Strategic Review. Lithuania: Ministry of Internal Affairs.Google Scholar
- Buzan, B., Wæver, O., & de Wilde, J. (1998). Security: A new framework for analysis. Boulder: Lynne Rienner.Google Scholar
- European Union Agency for Network and Information Security (ENISA). (2012). Cyber Europe 2012, key findings report, European Union Agency for Network and Information Security.Google Scholar
- Hansen, L., & Nissenbaum, H. (2009). Digital disaster, cyber security and the Copenhagen School (2009). International Studies Quarterly, 53, 1155–1175. Available at SSRN: https://ssrn.com/abstract=2567410.
- Harknett, R., & Stever, J. A. (2009). The cybersecurity triad: Government, private sector partners, and the engaged cybersecurity citizen. Journal of Homeland Security and Emergency Management. Berlin/New York: De Gruyter.Google Scholar
- Lobato, C. L., & Kenkel K. M. (2015). Discourses of cyberspace securitization in Brazil and in the United States. Revista Brasileira de Política Internacional, 58(2), 23–43. Available at http://www.scielo.br/pdf/rbpi/v58n2/0034-7329-rbpi-58-02-00023.pdf.CrossRefGoogle Scholar
- Moore, T. (2010). Introducing the economics of cybersecurity: Principles and policy options. National Academies of Sciences Engineering Medicine (NAP).Google Scholar
- Newmeyer, K. P. (2015). Elements of national cybersecurity strategy for developing nations. National Cybersecurity Institute Journal, 1(3), 9–19. Excelsior College, Albany.Google Scholar
- Saco, D. (1999). Colonizing cyberspace: “National security” and the Internet. In J. Weldes, M. Laffey, H. Gusterson, & R. Duvall (Eds.), Cultures of insecurity: States, communities, and the production of danger. Minneapolis: University of Minnesota Press.Google Scholar
- Šaljić, E., & Đorđević, Z. (2011). Modern forms of terroism [!] environmental terrorism. Retrieved from https://dk.um.si/IzpisGradiva.php?lang=eng&id=30223.Google Scholar
- Świątkowska, J., et al. (2012). V4 cooperation in ensuring cyber security – Analysis and recommendations. Krákow: Koscluszko Institute.Google Scholar
- UNIDIR. (2013). The cyber index. International security trends and realities. Geneva: UNIDIR, United Nations Institute for DIsarmament Research.Google Scholar