Cybersecurity in Germany. (2018)
- Record Type:
- Book
- Title:
- Cybersecurity in Germany. (2018)
- Main Title:
- Cybersecurity in Germany
- Further Information:
- Note: Martin Schallbruch, Isabel Skierka.
- Authors:
- Schallbruch, Martin
Skierka, Isabel - Contents:
- Intro; Foreword; Contents; 1 Introduction; 1.1 On Terminology; 1.2 Approach; 1.3 Peculiarities of the German Political System; 1.4 Structure; References; 2 The German View on Cybersecurity; 2.1 The Public Perception of Cyber Issues; 2.2 Political and Regulatory Concepts; 2.3 Snowden and the Emerging Discussion About Technological Sovereignty; 2.4 Combining a German Data Protection and Engineering Approach with Holistic Cyber Debates; 2.5 Advantages and Disadvantages of the German Approach-A Preliminary Balance; References; 3 The Evolution of German Cybersecurity Strategy; 3.1 Introduction 3.2 Phase 1, 1991-2011: IT Security and Critical Infrastructure Protection3.3 Phase 2: 2011-2016: Building a Civilian Cybersecurity Strategy; 3.3.1 The First National Cybersecurity Strategy for Germany; 3.3.2 The IT Security Law; 3.3.3 The Snowden Revelations; 3.4 Phase 3, 2016-2018: Consolidating a Comprehensive Civilian-Military Approach to Cybersecurity; 3.4.1 The 2016 White Paper on German Security Policy and the Future of the Bundeswehr; 3.4.2 The 2016 Second National Cybersecurity Strategy; 3.4.3 Taking Stock of Past Developments for Future Cybersecurity Strategies; References 4 The Organisation of Cybersecurity in Germany4.1 Particularities of German Law Enforcement, Intelligence, and Public Security Organisations; 4.2 The German Military's Role in the Cyber Realm; 4.3 Cooperation and Conflict Between Agencies; 4.4 Public-Private Cybersecurity Cooperation; References; 5 CurrentIntro; Foreword; Contents; 1 Introduction; 1.1 On Terminology; 1.2 Approach; 1.3 Peculiarities of the German Political System; 1.4 Structure; References; 2 The German View on Cybersecurity; 2.1 The Public Perception of Cyber Issues; 2.2 Political and Regulatory Concepts; 2.3 Snowden and the Emerging Discussion About Technological Sovereignty; 2.4 Combining a German Data Protection and Engineering Approach with Holistic Cyber Debates; 2.5 Advantages and Disadvantages of the German Approach-A Preliminary Balance; References; 3 The Evolution of German Cybersecurity Strategy; 3.1 Introduction 3.2 Phase 1, 1991-2011: IT Security and Critical Infrastructure Protection3.3 Phase 2: 2011-2016: Building a Civilian Cybersecurity Strategy; 3.3.1 The First National Cybersecurity Strategy for Germany; 3.3.2 The IT Security Law; 3.3.3 The Snowden Revelations; 3.4 Phase 3, 2016-2018: Consolidating a Comprehensive Civilian-Military Approach to Cybersecurity; 3.4.1 The 2016 White Paper on German Security Policy and the Future of the Bundeswehr; 3.4.2 The 2016 Second National Cybersecurity Strategy; 3.4.3 Taking Stock of Past Developments for Future Cybersecurity Strategies; References 4 The Organisation of Cybersecurity in Germany4.1 Particularities of German Law Enforcement, Intelligence, and Public Security Organisations; 4.2 The German Military's Role in the Cyber Realm; 4.3 Cooperation and Conflict Between Agencies; 4.4 Public-Private Cybersecurity Cooperation; References; 5 Current Priorities and Gaps in German National Cybersecurity, Future Trends; 5.1 Introduction; 5.2 Legal, Technical and Practical Development of Active Cyber Defence; 5.3 Cybersecurity Architecture-Roles and Responsibilities of Agencies; 5.4 Towards a Governmental Vulnerability Handling Strategy 5.5 Implementing a Comprehensive IT Security Industry Policy5.6 Finding a Coherent Legal Concept for Safety and Security; 5.7 International Cooperation; References; 6 Conclusion … (more)
- Publisher Details:
- Cham, Switzerland : Springer
- Publication Date:
- 2018
- Extent:
- 1 online resource
- Subjects:
- 005.8
Computer science
Computer security -- Germany
COMPUTERS / Security / General
Computer security
Computers -- Social Aspects -- General
Political Science -- Public Policy -- General
Ethical & social aspects of IT
Public administration
Data protection
Public policy
Computers -- Security -- General
Computer security
Germany
Electronic books - Languages:
- English
- ISBNs:
- 9783319900148
3319900145 - Related ISBNs:
- 9783319900131
3319900137 - Notes:
- Note: Includes bibliographical references.
Note: Online resource; title from PDF title page (EBSCO, viewed July 25, 2018). - Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.340531
- Ingest File:
- 01_289.xml