NATIONAL CYBERSECURITY STRATEGIES IN MEMBER STATES OF THE EUROPEAN UNION

Authors

  • Sevdalina Dimitrova Prof. DSc., „Vasil Levbski“ National Military University of Veliko Turnovo (BG)
  • Stoyko Stoykov Prof. Dr., „Vasil Levbski“ National Military University of Veliko Turnovo (BG)
  • Yosif Kochev Dr., «Neophyte Rilski» Southwestern University of Blagoevgard (BG)

DOI:

https://doi.org/10.17770/acj.v4i73.4355

Abstract

Viens no priekšnoteikumiem Eiropas Savienības politikas stratēģijas izstrādāšanai un attīstīšanai kiberdrošības jomā ir vienota “kiberdrošības” jēdziena izpratne. Izpratnes vienotību apgrūtina šim jēdzienam atbilstošo drošības aspektu daudzšķautnība un plašā ietekme gan uz Eiropas Savienības iedzīvotājiem, gan dalībvalstu attiecībām. Raksta galvenā tēze ir saistīta ar to, ka kiberdrošības problēmas ir ne vien ļoti specifiskas, bet arī ārkārtēji nozīmīgas, tāpēc problēmu kiberdrošības jomā risināšanai ir nepieciešama aktīva valstu un starptautisko organizāciju sadarbība.

Downloads

Download data is not yet available.

References

DIRECTIVE 95/46/EC OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data https://ccdcoe.org/sites/default/files/documents/EU-951024-DataProtectionDirective.pdf

The National Strategy to Secure Cyberspace, NSSC, VII). https://www.us-cert.gov/sites/default/files/publications/cyberspace_strategy.pdf

Markova, Ts., Information Security Legal regime, Sofia, 2015, ISBN: 978-619-7143-03-4

Petrova M., Varbanov St. Implementation of information system of enforcement in Bulgaria,according to the Law on Private Enforcement, ISMA, Riga, Latvia, ISSN 1691-2489, Information Technologies, Management and Society (2013) Volume 6, No. 1, 39 – 45.

Cybersecurity Strategy of the European Union. An Open, Safe and Secure Cyberspace, JOIN (2013) 1 final, Brussels, 7.2.2013, p. 3.

National Cyber Security Strategies. Practical Guide on Development and Execution, European Network and Information Security Agency (ENISA), December 2012.

https://ccdcoe.org/strategies-policies.html

Finland’s Cyber Security Strategy (2013), http://www.yhteiskunnanturvallisuus.fi/en/materials/doc_download/40-finlandas-cyber-security-strategy

Cyber Security Strategy (2014) https://www.mkm.ee/sites/default/files/cyber_security_strategy_2014-2017_public_version.pdf, as well as the previous strategy for the period 2008 – 2013.

Cyber Security Strategy of the Czech Republic 2015 – 2020 (2015) https://ccdcoe.org/sites/default/files/strategy/CZE_NCSS_en.pdf

Finland’s Cyber Security Strategy (2013) http://www.yhteiskunnanturvallisuus.fi/en/materials/doc_download/40-finlandas-cyber-security-strategy

Cyber Security Strategy for Germany (2011) http://www.bmi.bund.de/SharedDocs/Downloads/DE/Themen/OED_Verwaltung/Informationsgesellschaft/cyber.pdf?__blob=publicationFile

National Cyber Security Strategy of Hungary (2013) http://www.nbf.hu/anyagok/Government%20Decision%20No%201139_2013%20on%20the%20National%20Cyber%20Security%20Strategy%20of%20Hungary.docx

Latvian cyber security strategy for the period 2014 to 2018 (2014) https://ccdcoe.org/sites/default/files/strategy/LVA_CSS_2014-2018.pdf

National Cyber Security, a Commitment for Everybody (2013) http://www.ismsforum.es/ficheros/descargas/a-national-cyber-security-strategy-.pdf

National Cyber Security Strategy 2: From Awareness to Capability (2013) http://english.nctv.nl/images/national-cyber-security-strategy-2_tcm92-520278.pdf

Cyberspace Protection Policy of the Republic of Poland (2013) http://www.cert.gov.pl/download/3/162/PolitykaOchronyCyberprzestrzeniRP148x210wersjaang.pdf

The UK Cyber Security Strategy. Protecting and Promoting the UK in a Digital World (2011) https://www.gov.uk/government/publications/cyber-security-strategy

Downloads

Published

30.12.2015

How to Cite

Dimitrova, S., Stoykov, S., & Kochev, Y. (2015). NATIONAL CYBERSECURITY STRATEGIES IN MEMBER STATES OF THE EUROPEAN UNION. Administrative and Criminal Justice, 4(73), 54-58. https://doi.org/10.17770/acj.v4i73.4355