PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
2020 | nr 2 | 43--60
Tytuł artykułu

What Is the Future of European Cyber Security? Three Principles of European Cooperation and the Hybrid Joint Strategy of Cyber Defence

Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
The author argues that EU member states should pursue a joint strategy of cyber security and cyber defence. This claim does not immediately imply support for current EU legislation, in particular for enforcing the NIS Directive or the operation of ENISA in its currently planned capacity. Instead, three principles of European cooperation are discussed and followed by a proposal to centre the joint strategic effort around promoting and explicating the practical and procedural consequences of these principles. A bottom-up approach to joining and uniformization of European cyber defence is presented, aligned with the notion of Europeanization in security policy in the sense of E. Gross and R. Ladrech. This approach requires that European cyber security agencies, including ENISA, focus their efforts on addressing the trust deficit among the member states through facilitating the environment for safe information exchange, instead of communicating with the member states through the medium of regulations and prescribing security standards. More generally, the author postulates that the European authorities embrace the inherent political character of international trust-building and aspire to the role of mediator, as opposed to presenting themselves as apolitical agents focused on the purely technical aspects of European cyber security.(original abstract)
Rocznik
Numer
Strony
43--60
Opis fizyczny
Twórcy
  • Université Catholique de Louvain (UCLouvain) ; Jagiellonian University
Bibliografia
  • Baezner M., Robin, P., Cyber-confl ict between the United States of America and Russia (No. 2), ETH Zurich, 2017.
  • Banasiński C., Cyberbezpieczeństwo. Zarys wykładu (Cybersecurity. Draft of the lecture), Warszawa 2018.
  • Brun L., The role of the European Union Agency for Network and Information Security (ENISA) in the governance strategies of European cybersecurity, Faculté des sciences é conomiques, sociales, politiques et de communication, Université catholique de Louvain, Bellanova, Rocco 2018.
  • Directive (EU) 2016/1148 of the European Parliament and of the Council of 6 July 2016 concerning measures for a high common level of security of network and information systems across the Union, Brussels, 06.07.2016.
  • Ghafur S., Kristensen S., Honeyford K., Martin G., Darzi A., Aylin P., A retrospective impact analysis of the WannaCry cyberattack on the NHS, "NPJ digital medicine", no. 2(1)/2019, DOI: https://doi.org/10.1038/s41746-019-0161-6
  • Global intelligence oversight: governing security in the twenty-first century, eds. Z. Goldman, S. Rascoff, Oxford University Press, Oxford 2016.
  • Greenberg A., The untold story of NotPetya, the most devastating cyberattack in history, "Wired", August 22, 2018.
  • Gross E., Germany and European security and defence cooperation: The Europeanization of national crisis management policies, "Security Dialogue", no. 38(4)/2007.
  • Hassner P., An overview of the problem, in: War and Peace: European Conflict Prevention, Chaillot Paper 11, Institute for Security Studies of WEU, 1993.
  • https://ec.europa.eu/digital-single-market/en/eu-cybersecurity-certifi cationframework (access 10.01.2020).
  • https://ec.europa.eu/digital-single-market/en/implementation-nisdirective-germany (access 2505. 2018).
  • https://ec.europa.eu/growth/single-market_en (access 10.01.2020).
  • https://eeas.europa.eu/headquarters/headquarters-homepage/63376/ stronger-eu-defence-face-global-challenges_en (access 10.12.2019).
  • https://en.oxforddictionaries.com/definition/us/cyberthreat (access 25.05.2018).
  • https://www.cert-verbund.de/ (access 25.05.2018).
  • https://www.cybereason.com/blog/how-geopolitical-events-will-changecybersecurity-in-2020 (access 30.12.2019).
  • https://www.eu2017.ee/videos/eu-cyber-security-conference-arneschonbohm-and-guillaume-poupard.html (access 25.05.2018).
  • https://euobserver.com/justice/141860 (access 10.03.2020).
  • https://www.euractiv.com/section/cybersecurity/interview/commissionshould-walk-the-walk-on-cybersecurity-german-chief-says/ (access 25.05.2018).
  • https://www.euractiv.com/section/cybersecurity/news/ansip-vowsto-respect-sovereignty-with-new-cybersecurity-measures/ (access 25.05.2018).
  • https://www.euractiv.com/section/cybersecurity/news/europe-needsdigital-border-controls-industry-chief-says/ (access 3.03.2020).
  • https://www.euractiv.com/section/cybersecurity/news/junckerannounces-massive-cyber-security-overhaul/ (access 10.03.2020).
  • https://www.secureworks.com/blog/cyber-threat-basics (access 25.05.2018).
  • Ladrech R., Europeanization of domestic politics and institutions: The case of France, "Journal of Common Market Studies", no. 32(1)/1994, DOI: https://doi.org/10.1111/j.1468-5965.1994.tb00485.x.
  • Nakashima E., Russian military was behind NotPetya cyberattack in Ukraine, CIA concludes. "The Washington Post", no. 12/2018.
  • Newman S., Surviving ransom driven DDoS extortion campaigns, "Cyber Security: A Peer-Reviewed Journal", no. 3(1)/2019.
  • Obermayer B., Obermaier F., The Panama Papers: Breaking the story of how the rich and powerful hide their money, Oneworld Publications 2016.
  • Risse T., Green Cowles M., Caporaso J., Europeanization and Domestic Change: Introduction, in: Transforming Europe: Europeanization and Domestic Change, eds. M. Green Cowles, J. Caporaso, T. Risse, CornellUniversity Press, Ithaca, NY 2001.
  • Sliwinski K., Moving beyond the European Union's weakness as a cybersecurity agent, "Contemporary Security Policy", no. 35(3)/2014, DOI: https://doi.org/10.1080/13523260.2014.959261.
  • The joint communication to the European Parliament and the European Council of the European Commission's High Representative of the Union for Foreign Affairs and Security Policy "Resilience, Deterrence and Defence: Building strong cybersecurity for the EU", JOIN(2017)450 final, Brussels, 13.09.2017.
  • Von Solms R., Van Niekerk J., From information security to cyber security, "Computers & Security", no. (38)/2013, DOI: https://doi.org/10.1016/j.cose.2013.04.004.
  • Welchman G., The Hut Six Story: Breaking the Enigma Codes, M&M Baldwin 1997.
  • Wouters J., Naert F., The European Union and Confl ict Prevention: a Brief Historic Overview, "KULeuven Institut of International Law Working Paper", no. 52, April 2003, DOI: https://doi.org/10.1007/978-90-6704-539-1_3.
Typ dokumentu
Bibliografia
Identyfikatory
Identyfikator YADDA
bwmeta1.element.ekon-element-000171611259

Zgłoszenie zostało wysłane

Zgłoszenie zostało wysłane

Musisz być zalogowany aby pisać komentarze.
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.