|
List of Tables, Boxes and Figures |
|
|
viii | |
Foreword |
|
ix | |
Preface |
|
xi | |
Acknowledgements |
|
xii | |
|
|
1 | (10) |
|
The salience of cybersecurity in the European Union |
|
|
1 | (2) |
|
Central questions and objectives of the book |
|
|
3 | (6) |
|
The structure and organisation of the book |
|
|
9 | (2) |
|
2 Conceptualising Security as Resilience in Cyberspace |
|
|
11 | (24) |
|
|
11 | (1) |
|
Approaches to analysing cybersecurity |
|
|
12 | (9) |
|
Understanding the European Union in cybersecurity |
|
|
21 | (14) |
|
Ecosystems and resilience |
|
|
21 | (7) |
|
|
28 | (5) |
|
Conclusion: Security as resilience |
|
|
33 | (2) |
|
3 Cybersecurity in the Global Ecosystem |
|
|
35 | (27) |
|
Introduction: The international context |
|
|
35 | (2) |
|
Internet governance and cybersecurity |
|
|
37 | (7) |
|
|
37 | (4) |
|
Internet Governance Forum |
|
|
41 | (3) |
|
Multilateral organisations and cybersecurity |
|
|
44 | (16) |
|
|
44 | (2) |
|
|
46 | (1) |
|
International Telecommunications Union (ITU) |
|
|
47 | (3) |
|
North Atlantic Treaty Organisation (NATO) |
|
|
50 | (4) |
|
Organisation for Economic Cooperation and Development (OECD) |
|
|
54 | (2) |
|
|
56 | (2) |
|
Organisation for Security and Cooperation in Europe (OSCE) |
|
|
58 | (2) |
|
Conclusion: Security as resilience in the international cyber ecosystem |
|
|
60 | (2) |
|
4 National Cybersecurity Approaches in the European Union: The Case of the UK |
|
|
62 | (25) |
|
|
62 | (2) |
|
The UK's evolving narrative on cybersecurity |
|
|
64 | (3) |
|
The UK cybersecurity strategy: Building effective security as resilience? |
|
|
67 | (17) |
|
Cybercrime and making cyberspace safe for UK business: Institutional innovation and improved partnership? |
|
|
69 | (3) |
|
Securing cyberspace for business: Partnerships, information sharing and standards |
|
|
72 | (4) |
|
Cyber-attacks and resilience |
|
|
76 | (3) |
|
Shaping the international |
|
|
79 | (3) |
|
Knowledge, skills and capability |
|
|
82 | (2) |
|
Conclusion: UK security as resilience |
|
|
84 | (3) |
|
5 The European Union and Cybercrime |
|
|
87 | (32) |
|
|
87 | (3) |
|
Governing cybercrime in the European Union |
|
|
90 | (26) |
|
Exploitation of the online world for the purposes of abusing children |
|
|
98 | (3) |
|
The cybersecurity strategy of the European Union: Cybercrime |
|
|
101 | (2) |
|
|
103 | (2) |
|
Cooperation, collaboration and operational aspects |
|
|
105 | (11) |
|
Conclusion: Security as resilience and European Union cybercrime |
|
|
116 | (3) |
|
6 Network and Information Security and Cyber Defence in the European Union |
|
|
119 | (25) |
|
|
119 | (2) |
|
Governing NIS in the European Union |
|
|
121 | (11) |
|
Network and information security in the cybersecurity strategy of the European Union: Achieving cyber resilience? |
|
|
132 | (10) |
|
European Union cyber defence: Under construction? |
|
|
136 | (6) |
|
|
142 | (2) |
|
7 Transatlantic Cooperation in Cybersecurity: Converging on Security as Resilience? |
|
|
144 | (27) |
|
|
144 | (2) |
|
|
146 | (4) |
|
Security, data privacy and data protection |
|
|
150 | (12) |
|
EU and US logics and approaches |
|
|
150 | (4) |
|
Network and information security: Critical infrastructure protection |
|
|
154 | (3) |
|
Data privacy and protection |
|
|
157 | (5) |
|
EU--US platforms for cooperation and coordination on cybersecurity and cybercrime |
|
|
162 | (5) |
|
Conclusion: Converging on security as resilience? |
|
|
167 | (4) |
|
8 Conclusions: Towards Effective Security as Resilience in the European Union? |
|
|
171 | (19) |
|
|
171 | (2) |
|
The emerging ecosystem in the European Union: Security as resilience? |
|
|
173 | (12) |
|
|
174 | (4) |
|
Network and information security |
|
|
178 | (2) |
|
|
180 | (2) |
|
Reflections on the domestic and international |
|
|
182 | (3) |
|
Reflections and final thoughts |
|
|
185 | (5) |
Notes |
|
190 | (9) |
References |
|
199 | (17) |
Index |
|
216 | |