Professional Documents
Culture Documents
Two levels can be distinguished on which security in and from cyberspace can be at risk:
Technical level: While it is a commonplace that our societies are entirely and
pervasively dependent upon ICT, the complexity and interconnectedness of this
dependence is growing. With dependence comes vulnerability. On the first level,
this vulnerability is linked to the danger of system failures that may have cascading
effects affecting not only the individual use of ICT, but crippling the smooth
functioning of entire branches of societal activity and security.
Actor level: Triggered by the pervasive societal dependence upon information and
communication technology, the second area of vulnerability is the one linked to
26 M. Dunn Cavelty and M. Suter
Fig. 3.
In theory, what one perceives as threatening and what one perceives as being
threatened generates the focus of what is perceived to be in need of protection. A clear
prioritization of the threats would therefore lead to a prioritization of response
strategies. However, as mentioned above, in the case of CIIP cybersecurity, it is
neither possible to define which actor poses the biggest threat, nor can the two
28 M. Dunn Cavelty and M. Suter
dimensions of economy and national security be viewed in isolation. In consequence, the link between threat
perceptions and countermeasures is far less clear. In fact, even though the strategies do differ in their assessments of
key threats, they arrive at very similar countermeasures, as is shown in the next section.