Inform/Cybersecurity: Difference between revisions
< Inform
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
| Line 1: | Line 1: | ||
{{sidenote|This is an example page covering a policy issue. It should be explained in terms not tied to one particular jurisdiction or bill.}} | |||
==What is cybersecurity?== | ==What is cybersecurity?== | ||
{{sidenote|The What Is section summarises the topic in three or four sentences.}} | |||
Cybersecurity is a popular term used to encompass all aspects of the security of users and computers on the Internet. It is not commonly used among professionals, who prefer "information security" or "computer security". | Cybersecurity is a popular term used to encompass all aspects of the security of users and computers on the Internet. It is not commonly used among professionals, who prefer "information security" or "computer security". | ||
==Prerequisites== | ==Prerequisites== | ||
{{sidenote|The Prerequisite Reading section lists ISPM pages related to this issue which need to be understood before engaging on the topic.}} | |||
* ''None'' | * ''None'' | ||
==Related== | ==Related== | ||
{{sidenote|The Related section lists other ISPM pages related to this issue.}} | |||
* [[Netpolicy/ISPM/Privacy|Privacy]] | * [[Netpolicy/ISPM/Privacy|Privacy]] | ||
| Line 15: | Line 23: | ||
==Discussion== | ==Discussion== | ||
Cybersecurity encompasses the security of servers (e.g. from data theft), home computers (e.g. from being co-opted into a [[Botnet|botnet]]) and networks (e.g. from being used to divert traffic). It may also be used to cover the security of infrastructure (SCADA) systems such as the computers which run transport or utility networks. | {{sidenote|The Discussion section is where the issue is analysed in more detail.}} | ||
Cybersecurity encompasses the security of servers (e.g. from [[data theft]]), home computers (e.g. from being co-opted into a [[Botnet|botnet]]) and networks (e.g. from being used to divert traffic). It may also be used to cover the security of infrastructure ([[SCADA]]) systems such as the computers which run transport or utility networks. | |||
Cybersecurity legislation may contain one or more of the following features: | Cybersecurity legislation may contain one or more of the following features: | ||
| Line 24: | Line 34: | ||
==Questions To Ask== | ==Questions To Ask== | ||
{{sidenote|The Questions To Ask section gives good questions to ask about any proposed legislation in this area, which help to draw out whether it is beneficial or not.}} | |||
The following are helpful questions to ask, specifically about proposed cybersecurity legislation: | The following are helpful questions to ask, specifically about proposed cybersecurity legislation: | ||
| Line 31: | Line 43: | ||
* Are any technological prescriptions (e.g. for security measures) at risk of being outpaced by change and restricting innovation and improvement? | * Are any technological prescriptions (e.g. for security measures) at risk of being outpaced by change and restricting innovation and improvement? | ||
==Further Reading== | ==Further Reading and Resources== | ||
{{sidenote|The Further Reading and Resources section gives links to presentation slides, images, videos or other useful explanatory content.}} | |||
* [http://en.wikipedia.org/wiki/Computer_security Computer security] on Wikipedia | * [http://en.wikipedia.org/wiki/Computer_security Computer security] on Wikipedia | ||
* [http://www.chathamhouse.org/research/security/current-projects/cyber-security Cybersecurity] at Chatham House | * [http://www.chathamhouse.org/research/security/current-projects/cyber-security Cybersecurity] at Chatham House | ||
* [http://www.chathamhouse.org/events/view/190539 UK Cybersecurity Information Sharing Partnership] - a voluntary approach | * [http://www.chathamhouse.org/events/view/190539 UK Cybersecurity Information Sharing Partnership] - a voluntary approach | ||
Revision as of 10:11, 15 July 2013
This is an example page covering a policy issue. It should be explained in terms not tied to one particular jurisdiction or bill.
What is cybersecurity?
The What Is section summarises the topic in three or four sentences.
Cybersecurity is a popular term used to encompass all aspects of the security of users and computers on the Internet. It is not commonly used among professionals, who prefer "information security" or "computer security".
Prerequisites
The Prerequisite Reading section lists ISPM pages related to this issue which need to be understood before engaging on the topic.
- None
Related
The Related section lists other ISPM pages related to this issue.
- Privacy
- Cyber Intelligence Sharing and Protection Act (USA)
- Cybersecurity Strategy of the European Union (EU)
Discussion
The Discussion section is where the issue is analysed in more detail.
Cybersecurity encompasses the security of servers (e.g. from data theft), home computers (e.g. from being co-opted into a botnet) and networks (e.g. from being used to divert traffic). It may also be used to cover the security of infrastructure (SCADA) systems such as the computers which run transport or utility networks.
Cybersecurity legislation may contain one or more of the following features:
- Criminal penalties for malicious actions or information theft
- Safe harbors or liability limitations for information sharing about cybersecurity incidents
- Requirements on companies to improve their network security
Questions To Ask
The Questions To Ask section gives good questions to ask about any proposed legislation in this area, which help to draw out whether it is beneficial or not.
The following are helpful questions to ask, specifically about proposed cybersecurity legislation:
- How does it benefit the average internet user?
- What, if any, risky or unwanted behaviours are enabled by any liability limitations?
- Are any technological prescriptions (e.g. for security measures) at risk of being outpaced by change and restricting innovation and improvement?
Further Reading and Resources
The Further Reading and Resources section gives links to presentation slides, images, videos or other useful explanatory content.
- Computer security on Wikipedia
- Cybersecurity at Chatham House
- UK Cybersecurity Information Sharing Partnership - a voluntary approach