Skip to main content

Current Priorities and Gaps in German National Cybersecurity, Future Trends

  • Chapter
  • First Online:
Cybersecurity in Germany

Part of the book series: SpringerBriefs in Cybersecurity ((BRIEFSCYBER))

Abstract

Current German cybersecurity policy suffers from several gaps that this section examines in more detail. These gaps become apparent in international comparison and contrast with German officials' own claims that Germany’s cybersecurity policy is strategically comprehensive. First, Germany has not devised a clear concept for the goal, scope, and legal framework of "active cyber defence" measures. Second, a major question remains that of the overarching institutional architecture for cybersecurity, including the responsibilities of the individual security authorities in the cyber domain and their differentiation and cooperation. Third, the debate on how the state should deal with IT security vulnerabilities is still in its infancy. Fourth, an implementation concept for the politically undisputed increase in the liability of software manufacturers for vulnerabilities in their products is lacking. Fifth, a national and European industrial policy on cybersecurity, which is widely called for under the banner of “digital sovereignty”, is still largely undefined. Finally, Germany must define and assume a more comprehensive role in international efforts to maintain peace and stability in cyberspace.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 44.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 59.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    The share of the IT security industry of the total ICT industry in Germany is around 10%.

References

  • Abel W, Schafer B (2009) The German constitutional court on the right in confidentiality and integrity of information technology systems—a case report on BVerfG, NJW 2008, 822. SCRIPT 6(1):106–123

    Google Scholar 

  • Bundesministerium des Innern (2011) Cyber-Sicherheitsstrategie für Deutschland. Berlin

    Google Scholar 

  • Bundesministerium des Innern (2016) Cyber-Sicherheitsstrategie für Deutschland. Berlin

    Google Scholar 

  • Bundesministerium für Wirtschaft und Energie (2014) Der IT-Sicherheitsmarkt in Deutschland. Berlin

    Google Scholar 

  • Bundesregierung (1999) Bericht der Bundesregierung zu den Auswirkungen der Nutzung kryptografischer Verfahren auf die Arbeit der Strafverfolgungs- und Sicherheitsbehörden (Ziffer 4 der Eckpunkte der deutschen Kryptopolitik vom 2. Juni 1999) “Verschlüsselungsbericht”

    Google Scholar 

  • Bundesverfassungsgericht (2008) NJW. p 822

    Google Scholar 

  • CDU/CSU, SPD (2018) Ein neuer Aufbruch für Europa. Eine neue Dynamik für Deutschland. Ein neuer Zusammenhalt für unser Land. Koalitionsvertrag zwischen CDU/CSU und SPD, vol 19. Legislaturperiode, Berlin

    Google Scholar 

  • Diekmann G (2015) Digitale Souveränität - Positionsbestimmung und erste Handlungsempfehlungen für Deutschland und Europa. Bitkom, Berlin

    Google Scholar 

  • ENISA (2014) Europe’s ICT sector—the need for coordinated and responsive EU policies (July 2014) [online]. Available: https://www.enisa.europa.eu/events/enisa-events/enisa-high-level-event-2014-and-ecsm-launch/eu-digital-security-policy Accessed: 20 Jun 2018

  • European Commission (2017) Title III of the Proposal for a Regulation on ENISA, the “EU Cybersecurity Agency”, and repealing Regulation (EU) 526/2013, and on Information and Communication Technology cybersecurity certification (‘‘Cybersecurity Act’’), 2017-09-13, COM (2017) 477 final

    Google Scholar 

  • Forschungszentrum Informatik, Accenture GmbH, Bitkom Research GmbH (2017) “Kompetenzen für eine Digitale Souveränität,” Bundesministerium für Wirtschaft und Energie (BMWi)

    Google Scholar 

  • Gallagher S (2014) Photos of an NSA “upgrade” factory show Cisco router getting implant. Ars Technica (14 May 2014) [Online]. Available: https://arstechnica.com/tech-policy/2014/05/photos-of-an-nsa-upgrade-factory-show-cisco-router-getting-implant/. Accessed 31 Mar 2018

  • Gaycken S (2017) Recommendations for the development of vulnerability equities processes In: DSI industrial and policy recommendations, vol 7

    Google Scholar 

  • Gerlach C (2015) Sicherheitsanforderungen für Telemediendienste – der neue § 13 Abs. 7 TMG. CR, p 581

    Google Scholar 

  • Government of the United States (2017) Vulnerabilities equities policy and process for the United States Government

    Google Scholar 

  • Grigsby A (2017) The end of cyber norms. Survival 59(6):109–122

    Article  Google Scholar 

  • Hathaway M, Klimburg A (2012) Preliminary considerations: on national cyber security. In: National cyber security framework manual, NATO Cooperative Cyber Defence Centre of Excellence, Tallinn, pp 1–43

    Google Scholar 

  • Herpig S (2017) Government hacking. Global challenges. Stiftung Neue Verantwortung Impulse, Oct 2017, pp 1–18

    Google Scholar 

  • Hornung G (2008) Ein neues Grundrecht. Kommentierung zur BVerfG-Entscheidung. CR, p 299

    Google Scholar 

  • Hornung G (2015) Neue Pflichten für Betreiber kritischer Infrastrukturen: Das IT-Sicherheitsgesetz des Bundes. NJW, p 3334

    Google Scholar 

  • KPMG (2014) IT-Sicherheit in Deutschland - Handlungsempfehlungen für eine zielorientierte Umsetzung des IT-Sicherheitsgesetztes

    Google Scholar 

  • Krempl S (2017) Staatstrojaner-Gesetz: Nächster Halt Bundesverfassungsgericht, Heise online (23 June 2017) [Online]. Available https://www.heise.de/newsticker/meldung/Staatstrojaner-Gesetz-Naechster-Halt-Bundesverfassungsgericht-3754891.html. Accessed 31 Mar 2018

  • Lachow I (2013) Active cyber defense: a framework for policymakers. Center for New American Security Policy Brief (Feb 2013)

    Google Scholar 

  • Luiijf E, Healey J (2012) Organisational structures & considerations. In: National cyber security framework manual, NATO CCDCOE, Tallinn, pp 108–145

    Google Scholar 

  • Masters J (2014) What is internet governance? Council on foreign relations (23 Apr 2014) [Online]. Available: https://www.cfr.org/backgrounder/what-internet-governance. Accessed 31 Mar 2018

  • Organization for Security and Co-operation in Europe (2016) Decision No. 1202—OSCE confidence-building measures to reduce the risks of conflict stemming from the use of information and communication technologies

    Google Scholar 

  • Potter EH (2002) Cyber-diplomacy: managing foreign policy in the twenty-first century. McGill-Queen’s University Press, Quebec

    Google Scholar 

  • Reinhold T, Schulze M (2017) Digitale Gegenangriffe. Eine Analyse der technischen und politischen Implikationen von “hack backs”, vol 1. Arbeitspapier der Stiftung Wissenschaft und Politik

    Google Scholar 

  • Schallbruch M (2017a) IT-Sicherheitsrecht – Schutz kritischer Infrastrukturen und staatlicher IT-Systeme. Zur Entwicklung des IT-Sicherheitsrechts in der 18. Wahlperiode (Teil 1). CR 648–656

    Google Scholar 

  • Schallbruch M (2017b) IT-Sicherheitsrecht – Schutz digitaler Dienste, Datenschutz und Datensicherheit. Zur Entwicklung des IT-Sicherheitsrechts in der 18. Wahlperiode (Teil 2) CR 799–804

    Google Scholar 

  • Schallbruch M, Gaycken S, Skierka I (2018) Cybersicherheit 2018–2020: Handlungsvorschläge für CDU/CSU und SPD. DSI Industry & Policy Recommendations (IPR) Series, vol 1

    Google Scholar 

  • Singelnstein T, Derin B (2017) Das Gesetz zur effektiveren und praxistauglicheren Ausgestaltung des Strafverfahrens NJW, p 2646

    Google Scholar 

  • Spindler G (2016) IT-Sicherheitsgesetz und zivilrechtliche Haftung. CR 297

    Google Scholar 

  • Tanriverdi H (2017a) Der gefährliche Wunsch nach digitalen Gegenangriffen (10 Jan 2017) [Online]. Available: http://www.sueddeutsche.de/digital/verfassungsschutz-der-gefaehrliche-wunsch-nach-digitalen-gegenangriffen-1.3327618. Accessed 07 Mar 2018

  • Tanriverdi H (2017b) Bundesbehörde diskutiert digitale Gegenschläge (21 June 2017) [Online]. Available: http://www.sueddeutsche.de/digital/it-sicherheit-bundesbehoerde-diskutiert-ob-sie-zurueck-hacken-soll-1.3554124. Accessed 07 Mar 2018

  • United Nations General Assembly (2013) Report of the group of governmental experts on developments in the field of information and telecommunications in the context of international security, A/68/98

    Google Scholar 

  • United Nations General Assembly (2014) Revised draft resolution on the right to privacy in the digital age

    Google Scholar 

  • United Nations General Assembly (2015) Report of the group of governmental experts on developments in the field of information and telecommunications in the context of international security, A/70/174

    Google Scholar 

  • Verizon (2015) 2015 Data breach investigations report

    Google Scholar 

  • Verizon (2017) 2017 Data breach investigations report, 10th edn

    Google Scholar 

  • World Summit on the Information Society (2005) Tunis agenda for the information society

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Martin Schallbruch .

Rights and permissions

Reprints and permissions

Copyright information

© 2018 The Author(s)

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Schallbruch, M., Skierka, I. (2018). Current Priorities and Gaps in German National Cybersecurity, Future Trends. In: Cybersecurity in Germany. SpringerBriefs in Cybersecurity. Springer, Cham. https://doi.org/10.1007/978-3-319-90014-8_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-90014-8_5

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-90013-1

  • Online ISBN: 978-3-319-90014-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics