Cybersecurity: Public Sector Threats and ResponsesKim J. Andreasson The Internet has given rise to new opportunities for the public sector to improve efficiency and better serve constituents. But with an increasing reliance on the Internet, digital tools are also exposing the public sector to new risks. This accessible primer focuses on the convergence of globalization, connectivity, and the migration of public sector functions online. It examines emerging trends and strategies from around the world and offers practical guidance for addressing contemporary risks. It supplies an overview of relevant U.S. Federal cyber incident response policies and outlines an organizational framework for assessing risk. |
Contents
Chapter 1 The Global Rise of EGovernment and Its Security Implications | 1 |
Chapter 2 Understanding Cyber Threats | 27 |
Japan and the 2009 Attacks on South Korea and the United States | 55 |
Chapter 4 Toward a Global Approach to Cybersecurity | 77 |
The Tyranny of Geography | 109 |
Chapter 6 US Federal Cybersecurity Policy | 127 |
Chapter 7 European Cybersecurity Policy | 159 |
The Case of Catalonia | 193 |
Cybersecurity Policy Issues in a Gov 20 Environment and Beyond | 223 |
Chapter 10 The Civilian Cyber Incident Response Policies of the US Federal Government | 255 |
A Framework to Enhance Organizational Security | 275 |
Leadership Strategies for Securing Cyberspace | 293 |
Chapter 13 Is There a Conclusion to Cybersecurity? | 327 |
339 | |
Other editions - View all
Common terms and phrases
according actions activities Administration agencies approach areas authorities awareness become Center challenges citizens civil Commission communications cooperation coordination Council countries created crime critical infrastructure cyber attacks cybercrime cybersecurity cyberspace Defense Department Directive Domain e-government effective efforts electronic emerging establish European example federal framework global groups identify implementation important improve incident increase individual industry Information Security infrastructure initiatives Institute intelligence interests Internet involved issues measures ment mobile networks Office operations organizations participants partnerships potential practices private sector problem protection public sector regarding regional requirements response risk role sharing social media South Korea specific standards Strategy studies technical threats tion trust United University users vulnerabilities