Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword
Like this
8Activity
0 of .
Results for:
No results containing your search query
P. 1
SDA - Cyber-Security - The Vexed Question of Global Rules

SDA - Cyber-Security - The Vexed Question of Global Rules

Ratings: (0)|Views: 5,426 |Likes:
Published by Silendo

More info:

Published by: Silendo on Feb 01, 2012
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

02/27/2013

pdf

text

original

 
Cyber-security:
The vexed questionof global rules
 An independent reporton cyber-preparednessaround the world
With the support of 
 
 About the report
This report is published as part o the Security & Deence Agenda's(SDA) cyber-security initiative. It is intended as a snapshot o currentthinking around the world on the policy issues still to be resolved, andwill orm the basis o SDA debates and uture research during 2012.
 About the SDA
The SDA is Brussels’ only specialist security and deence think-tank. It iswholly independent and this year celebrates its 10
th
anniversary.
 About the author
Brigid Grauman is an independent Brussels-based journalist whose workappears widely in international media like the
 Financial Times
and
The
 
Wall Street Journal
. She’s currently engaged on a number o projectsor institutions, including the European Commission.
Report advisory board
Jeff Moss
, Vice-president and Chie Security Ofcer at ICANN andounder o the Black Hat and DEF CON computer hacker conerences
Reinhard Priebe
, Director or Internal Security, Directorate Generalor Home Aairs, European Commission
 Andrea Servida
, Deputy Head o the Internet, Network and InormationSecurity Unit, Inormation Society and Media Directorate General,European Commission
Jamie Shea
, Deputy Assistant Secretary General or Emerging SecurityChallenges at NATO
Brooks Tigner
, Editor and Chie Policy Analyst at Security EuropeMy thanks to all those who contributed to this report, both those I havequoted and those I have not. Special thanks to Melissa Hathaway andJamie Shea or their helpul comments on my drat text, to McAee'sDave Marcus, Phyllis Schneck and Sal Viveros, and to the SDA’s PaulineMassart and Igor Garcia-Tapia.
 
1
Contents
Introduction
........................................................3
RECOMMENDATIONS
...............................................5
PART ONE
Section I.
 
Clearing the booby traps from the cyber-security minefield
........6

 

........................................................6

 

.............................................8
 
........................................................9
Section II.
 
Tracking the cyber-revolution: New threats and changing ethics
..10

...........................11

..................................13

.................................14

.........15
Section III.
 
Cyber-defence strategies: The hottest debates and conditionsfor success
........................................................16

Section IV.
 
The quest for rules and regulations to govern cyber-space
.......22

............................23

.......................................23
 
.............................................25

..................................26

...............................26
 
...........27

............................28

................................................29

...................................................29

..................................................29

................................................30

Activity (8)

You've already reviewed this. Edit your review.
1 hundred reads
PacoSepulveda liked this
amilhim liked this
Oxony20 liked this
Oxony20 liked this
Giulio Picciotti liked this

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->