Abstract
A computer worm infests Iranian nuclear power plant systems, a cyberattack cripples sections of the Ukrainian electrical grid, intruders penetrate the German Parliament’s IT system and steal sensitive data. No longer merely the stuff of science fiction novels, cyberspace as a setting for security policy disputes and even a stage for conflicts, has long since become part of our reality.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Bitkom (2015). Studie zu Wirtschaftsschutz und Cybercrime. Accessed June 16, 2016, from https://www.bitkom.org/Presse/Presseinformation/Studie-zu-Wirtschaftsschutz-und-Cybercrime.html
CCDCOE (2013). Tallinn manual process. Accessed June 16, 2016, from https://ccdcoe.org/tallinn-manual.html
Die Bundesregierung (2016). Kabinettsklausur in Meseberg – Digitalisierung gemeinsam vorantreiben. Accessed June 16, 2016, from https://www.bundesregierung.de/Content/DE/Artikel/2016/05/2016-05-24-digitalisierung-meseberg.html
FAZ (2014). Cyber security summit – Jeder ist bedroht. Accessed June 16, 2016, from http://www.faz.net/aktuell/wirtschaft/netzwirtschaft/telekom-chef-thimotheus-hoettges-jeder-ist-bedroht-jeder-staat-jedes-unternehmen-jeder-buerger-13243841.html
FAZ (2016a). Cyber-Sicherheit: Die Hackerdämmerung. Accessed June 16, 2016, from http://www.faz.net/aktuell/wissen/physik-mehr/ukrainischer-stromausfall-war-ein-hacker-angriff-14005472-p2.html?printPagedArticle=true#pageIndex_2
FAZ (2016b). Netzangriff auf Bundestag – Es begann mit einer E-Mail. Accessed June 16, 2016, from http://www.faz.net/aktuell/feuilleton/medien/neue-details-zum-cyberangriff-auf-den-bundestag-14114851.html
Federal Academy for Security Policy (2016). The Lisa Case – STRATCOM lessons for European States (Security Policy Working Paper, No. 11/2016). Accessed June 16, 2016, from https://www.baks.bund.de/sites/baks010/files/working_paper_2016_11.pdf
Financial Times (2014). The web is a terrorist’s command-and-control network of choice. Accessed June 16, 2016, from http://www.ft.com/intl/cms/s/2/c89b6c58-6342-11e4-8a63-00144feabdc0.html#axzz3rjx7E4aL
Financial Times (2016). US launches online assault against Isis. Accessed June 16, 2016, from http://www.ft.com/cms/s/0/4d98edd0-fba5-11e5-b3f6-11d5706b613b.html#axzz4BkAXAl00
Gov.uk (2015). Chancellor’s speech to GCHQ on cyber security. Accessed June 16, 2016, from https://www.gov.uk/government/speeches/chancellors-speech-to-gchq-on-cyber-security
Ischinger, W., & Bunde, T. (2014). Die Zukunft des Westens im digitalen Zeitalter. FAZ of January 30, 2014.
Munich Security Conference (2016). Panel discussion “‘Daeshing’ terror and safeguarding liberties”. Accessed June 16, 2016, from https://www.securityconference.de/mediathek/video/panel-discussion-daeshing-terror-and-safeguarding-liberties/filter/video/?tx_dreipctvmediacenter_mediacenter[venue]=36&cHash=3c81bfeba609faf81063d1ece9232f09
Munich Security Report (2016). Munich security report 2016. Accessed June 16, 2016, from https://www.securityconference.de/aktivitaeten/munich-security-report/
NATO (2015). Keynote speech by NATO Secretary General Jens Stoltenberg at the Opening of the NATO transformation seminar. Accessed June 16, 2016, from http://www.nato.int/cps/fr/natohq/opinions_118435.htm?selectedLocale=fr
NATO (2016). NATO Defence Ministers agree to enhance collective defence and deterrence. Accessed June 17, 2016, from http://www.nato.int/cps/en/natohq/news_132356.htm?
Pew Research Center (2015). Germany and the United States: Reliable allies. Accessed June 16, 2016, from http://www.pewglobal.org/2015/05/07/germany-and-the-united-states-reliable-allies/
Reuters (2016). Concerned by Cyber Threat, Obama seeks big increase in funding. Accessed June 16, 2016, from http://www.reuters.com/article/us-obama-budget-cyber-idUSKCN0VI0R1
Rjiksoverheid (2016). Toespraak van minister Koenders bij de Münchner Sicherheitskonferenz. Accessed June 16, 2016, from https://www.rijksoverheid.nl/regering/inhoud/bewindspersonen/bert-koenders/documenten/toespraken/2016/02/12/toespraak-van-minister-koenders-munchner-sicherheitskonferenz
Serianu (2015). Kenya cyber security report 2015. Accessed June 16, 2016, from http://serianu.com/downloads/KenyaCyberSecurityReport2015.pdf
The Diplomat (2016). Top US spy chief: China still successful in cyber espionage against US. Accessed June 16, 2016, from http://thediplomat.com/2016/02/top-us-spy-chief-china-still-successful-in-cyber-espionage-against-us/
The German Marshall Fund of the United States (2015). Report of the task force on the future of German-American relations. Accessed June 16, 2016, from http://www.gmfus.org/publications/longstanding-partners-changing-times
Times Live (2015). It’s one hack of a problem. Accessed June 16, 2016, from http://m.timeslive.co.za/thetimes/?articleId=15801457
Wiegold, T. (2016). Cyberkrieger, Computernerds und IT-Einkäufer: Bundeswehr stellt sich neu auf. Accessed June 16, 2016, from http://augengeradeaus.net/2016/04/cyberkrieger-computernerds-und-it-einkaeufer-bundeswehr-stellt-sich-neu-auf/
Zeit online (2016). Deutscher Bundestag – Hackerangriff wurde aus Russland gesteuert. Accessed June 16, 2016, from http://www.zeit.de/digital/2016-01/hackerangriff-bundestag-russland-nachrichtendienst-bundesanwaltschaft
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this chapter
Cite this chapter
Ischinger, W. (2017). Security Policy: Rules for Cyberspace. In: Abolhassan, F. (eds) Cyber Security. Simply. Make it Happen.. Management for Professionals. Springer, Cham. https://doi.org/10.1007/978-3-319-46529-6_2
Download citation
DOI: https://doi.org/10.1007/978-3-319-46529-6_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-46528-9
Online ISBN: 978-3-319-46529-6
eBook Packages: Business and ManagementBusiness and Management (R0)