Atnaujinkite slapukų nuostatas

Cybersecurity in Switzerland 2014 ed. [Minkštas viršelis]

  • Formatas: Paperback / softback, 75 pages, aukštis x plotis: 235x155 mm, weight: 1474 g, 2 Illustrations, black and white; X, 75 p. 2 illus., 1 Paperback / softback
  • Serija: SpringerBriefs in Cybersecurity
  • Išleidimo metai: 27-Oct-2014
  • Leidėjas: Springer International Publishing AG
  • ISBN-10: 3319106198
  • ISBN-13: 9783319106199
Kitos knygos pagal šią temą:
  • Formatas: Paperback / softback, 75 pages, aukštis x plotis: 235x155 mm, weight: 1474 g, 2 Illustrations, black and white; X, 75 p. 2 illus., 1 Paperback / softback
  • Serija: SpringerBriefs in Cybersecurity
  • Išleidimo metai: 27-Oct-2014
  • Leidėjas: Springer International Publishing AG
  • ISBN-10: 3319106198
  • ISBN-13: 9783319106199
Kitos knygos pagal šią temą:
Gives the reader a detailed account of how cyber-security in Switzerland has evolved over the years, using official documents and a considerable amount of inside knowledge. It focuses on key ideas, institutional arrangements, on the publication of strategy papers, and importantly, on processes leading up to these strategy documents.

The peculiarities of the Swiss political system, which influence the way cyber-security can be designed and practiced in Switzerland are considered, as well as the bigger, global influences and driving factors that shaped the Swiss approach to cyber-security. It shows that throughout the years, the most important influence on the Swiss policy-approach was the international level, or rather the developments of a cyber-security policy in other states. Even though many of the basic ideas about information-sharing and public-private partnerships were influenced by (amongst others) the US approach to critical infrastructure protection, the peculiarities of the Swiss political system has led to a particular Swiss solution, which is based on the federalist structures and subsidiary principles, characterized by stability and resilience to external shocks in the form of cyber-incidents.

Cybersecurity in Switzerland will be a stimulating read for anybody interested in cyber-security policy, including students, researchers, analysts and policy makers. It contains not only specific material on an interesting case,  but also a wealth of

background information on different variations of cyber-security, as well as on information-sharing and public-private partnerships.

Recenzijos

Myriam Dunn Cavelty offers a short yet comprehensive summary of the political and strategic processes behind the Swiss approach to cyber-security. This is an interesting book for those who are considering Swiss-based hosting services to learn about the national cyber-regulatory framework, and also for those who are just curious about how a deeply federated nation such as Switzerland was able to develop a pervasive and effective cyber-strategy centered on civil protection. (Alessandro Berni, Computing Reviews, March, 2015)

1 Introduction
1(8)
1.1 The Approach
1(1)
1.2 On Terminology
2(2)
1.3 Switzerland: A Special Case
4(2)
1.3.1 Federalism: The Decentralization of Power and Authority
4(1)
1.3.2 Consensus Democracy
5(1)
1.4 Conclusion
6(3)
References
6(3)
2 Global Cyber-Security Policy Evolution
9(18)
2.1 Introduction
9(1)
2.2 The Undercurrent: Technological Insecurity
10(2)
2.3 Variations of the Cyber-Security Discourse
12(10)
2.3.1 Technical Discourse
13(1)
2.3.2 Crime-Espionage Discourse
14(3)
2.3.3 Civil Defense Discourse
17(3)
2.3.4 Military Discourse
20(2)
2.4 Conclusion
22(5)
References
23(4)
3 The Four-Pillar Model for Information Assurance (Phase 1: 1997--2004)
27(12)
3.1 Introduction
27(1)
3.2 The Day After in Cyberspace ... in Switzerland
28(3)
3.2.1 The SFU 1997
28(1)
3.2.2 Aftermath of the SFU 97
29(1)
3.2.3 Concept Information Assurance 2000
30(1)
3.3 Information Assurance: The Four-Pillar Model
31(4)
3.3.1 Pillar 1: Prevention
32(2)
3.3.2 Pillar 2: Early Warning
34(1)
3.3.3 Pillar 3: Damage Limitation
34(1)
3.3.4 Pillar 4: Combating Causes
35(1)
3.4 Conclusion
35(4)
References
36(3)
4 Reporting and Analysis Center for Information Assurance (MELANI) (Phase 2: 2004--2010)
39(18)
4.1 Introduction
39(1)
4.2 Basics of Public---Private Partnerships
40(5)
4.2.1 Win--Win Situations and Trust for Successful Information-Sharing
41(1)
4.2.2 Mitigating the Obstacles to Public--Private Information-Sharing
42(3)
4.3 MELANI: The Basic Set-up
45(7)
4.3.1 The Cooperation Model
45(3)
4.3.2 Two Customer Bases
48(2)
4.3.3 Services and Products
50(2)
4.4 Conclusion
52(5)
References
54(3)
5 Consolidation and Cyber-Risk Strategy (Phase 3: 2011--2014)
57(16)
5.1 Introduction
57(1)
5.2 National Strategy for Critical Infrastructure Protection (2005--2012)
58(5)
5.2.1 First Report on the Protection of Critical Infrastructures (2007)
59(1)
5.2.2 Basic Strategy for Critical Infrastructure Protection (2009)
60(2)
5.2.3 National Strategy for Critical Infrastructure Protection (2012)
62(1)
5.3 Cyber-Defense Strategy...or Not (2011--2013)
63(2)
5.4 Cyber-Risk: Reboot!
65(6)
5.4.1 Cyber-Preparedness in Switzerland
66(3)
5.4.2 The Way Ahead (The "Strategy")
69(2)
5.5 Conclusion
71(2)
References
72(1)
6 Conclusion
73
Reference
75