TY - JOUR
T1 - Concepts and principles of cyber security strate gies
AU - Štitilis, Darius
AU - Pakutinskas, Paulius
AU - Kinis, Uldis
AU - Malinauskaite, Inga
N1 - Funding Information:
This article is part of the research 'Analysis and adaptation of EU and NATO cyber security strategies: Lithuanian cyber security model', funded by the Research Council of Lithuania (Grant No. MIP-099/2015).
PY - 2016
Y1 - 2016
N2 - In the last few decades, the understanding of security has been changing. New areas emerged which may influence security facets, which were not urgent earlier. Now those facets can endanger individual persons or even states. Breaches of cyber security, separate attacks or intense cyber wars are becoming more usual than conventional wars in the physical space; violations of cyber security may cause great damage, ruin businesses or even temporarily paralyze full-fledged functioning of individual states or regions. Many countries of the world, realizing that such a threat is real, adopted Cyber Security Strategies; for some countries, this is not the first version of such a strategy. This article examines the place of Cyber Security Strategies in the system of state documents, the nature and importance of such strategies as well as whether they are binding on individuals and institutions. The article explores in more detail the principles of ensuring cyber security provided for in such strategies, i.e. the principles identified by the states, as important for ensuring cyber security. It is discussed why these principles are so different in the strategies of individual states.
AB - In the last few decades, the understanding of security has been changing. New areas emerged which may influence security facets, which were not urgent earlier. Now those facets can endanger individual persons or even states. Breaches of cyber security, separate attacks or intense cyber wars are becoming more usual than conventional wars in the physical space; violations of cyber security may cause great damage, ruin businesses or even temporarily paralyze full-fledged functioning of individual states or regions. Many countries of the world, realizing that such a threat is real, adopted Cyber Security Strategies; for some countries, this is not the first version of such a strategy. This article examines the place of Cyber Security Strategies in the system of state documents, the nature and importance of such strategies as well as whether they are binding on individuals and institutions. The article explores in more detail the principles of ensuring cyber security provided for in such strategies, i.e. the principles identified by the states, as important for ensuring cyber security. It is discussed why these principles are so different in the strategies of individual states.
KW - Concepts
KW - Cyber security
KW - European Union (EU)
KW - North Atlantic Treaty Organization (NATO)
KW - Principles
UR - http://www.scopus.com/inward/record.url?scp=85009951472&partnerID=8YFLogxK
U2 - 10.9770/jssi.2016.6.2(1)
DO - 10.9770/jssi.2016.6.2(1)
M3 - Article
AN - SCOPUS:85009951472
SN - 2029-7017
VL - 6
SP - 199
EP - 210
JO - Journal of Security and Sustainability Issues
JF - Journal of Security and Sustainability Issues
IS - 2
ER -