Abstract
This chapter provides an overview of Japan’s cybersecurity policy. After Sect. 1, which introduces the definition of cybersecurity, Sect. 2 touches on the current state of cybersecurity, tracing the changing means and objectives of cyberattacks and the corresponding approaches to cybersecurity. Section 3 considers the particular characteristics of Japan’s cybersecurity policy. In this section, the characteristics of Japan’s cybersecurity policy are discussed, focusing on the government role in the area. In Sect. 4, specific policy measures taken by the Ministry of Internal Affairs and Communications, one of the main government agencies responsible for cybersecurity policy, are introduced, in light of Sect. 3.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Cyber Security Strategy Headquarters. (2018). Cybersecurity strategy (in Japanese).
ICT-ISAC Japan, ACTIVE (in Japanese). Retrieved September 10, 2018, from https://www.ict-isac.jp/active/.
Information Technology Promotion Department, Ministry of Economy, Trade and Industry. (2016). Survey on recent trends and future forecasts of IT personnel (in Japanese).
International Organization for Standardization. ISO/IEC 27001. (2013). Retrieved September 10, 2018, from https://www.iso.org/isoiec-27001-information-security.html.
Investigative Committee on the Data Security Breach Incident Caused by Unauthorized Access, Japan Pension Service. (2015). Report on the investigation into the data security breach incident caused by unauthorized access (in Japanese).
Japan Industrial Standards Commission. (2014). JIS Q 27001:2014.
Japan Internet Providers Association (JAIPA), Telecommunications Carriers Association (TCA), Telecom Services Association (TELESA), Japan Cable and Telecommunications Association (JCTA), ICT-ISAC. (2018). Guideline for properly dealing with telecommunications business cyber-attacks and secrecy of communications (in Japanese).
Kamata, K. (2017). Introduction to cyber security management (in Japanese). Tokyo: Kinzai Institute for Financial Affairs Inc.
Ministry of Internal Affairs and Communications. (2014). First report from the study group on properly dealing with telecommunications business cyber-attacks (in Japanese).
Ministry of Internal Affairs and Communications. (2017). Results of eighth director general-level meeting of the Japan-U.S. policy cooperation dialogue on the internet economy (in Japanese).
Ministry of Internal Affairs and Communications. (2018). Results of ninth director general-level meeting of the Japan-U.S. policy cooperation dialogue on the internet economy (in Japanese).
Ministry of Internal Affairs and Communications. (2019). 2019 progress report on comprehensive IoT security measures (in Japanese).
National Institute of Information and Communications Technology. (2018). 2017 NICTER observation report (in Japanese).
National Policy Agency, Unauthorized Computer Access Act Study Group. (2012). Point-by-point digest of laws on the prohibition of unauthorized computer access (in Japanese).
Natsui, T. (2012). Comparative study on cyber crime (1): DDoS attacks (in Japanese). Horitsu Ronso, 85(1), 197–231.
Okamura, H. (2011). Information security law (Revised ed.) (in Japanese). Tokyo: Shojihomu CO., Ltd.
The White House. (2017). U.S. Presidential Executive Order. Strengthening the cybersecurity of federal networks and critical infrastructure.
Torasawa, K., Third Special Investigation Chamber, House of Councilors. (2015). Issues with cyber space laws: From the perspective of internet governance and government structures (in Japanese). Rippou to Chousa, 369, 143–156.
U.S. Department of Commerce and Department of Homeland Security. (2018). Report to the president on enhancing the resilience of the internet and communications ecosystem against botnets and other automated, distributed threats.
List of Laws
Act on Prohibition of Unauthorized Computer Access. Act No. 128, 1999.
Japan’s Basic Act on Cybersecurity. Act No. 104, 2014.
The Penal Code. Act No. 45, 1907.
The Regulations for Telecommunications Facilities for Telecommunications Business. Ministry of Internal Affairs and Communications Ordinance No. 30 of 1985.
Telecommunications Business Act. Act No. 86, 1984.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
Aikawa, W. (2020). Japan’s Cybersecurity Policy. In: Mitomo, H. (eds) Telecommunications Policies of Japan. Advances in Information and Communication Research, vol 1. Springer, Singapore. https://doi.org/10.1007/978-981-15-1033-5_7
Download citation
DOI: https://doi.org/10.1007/978-981-15-1033-5_7
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-1032-8
Online ISBN: 978-981-15-1033-5
eBook Packages: Economics and FinanceEconomics and Finance (R0)