ABSTRACT

This companion provides the most comprehensive and up-to-date comparative overview of the cyber-security strategies and doctrines of the major states and actors in Europe, North America, South America, Africa, and Asia.

The volume offers an introduction to each nation’s cyber-security strategy and policy, along with a list of resources in English that may be consulted for those wishing to go into greater depth. Each chapter is written by a leading academic or policy specialist, and contains the following sections:

  • overview of national cyber-security strategy;
  • concepts and definitions;
  • exploration of cyber-security issues as they relate to international law and governance;
  • critical examinations of cyber partners at home and abroad;
  • legislative developments and processes;
  • dimensions of cybercrime and cyberterrorism;
  • implications of cyber-security policies and strategies.

This book will be of much interest to students and practitioners in the fields of cyber-security, national security, strategic studies, foreign policy, and international relations.

chapter |7 pages

Introduction

Cybersecurity strategy and policy in a comparative context

part I|240 pages

Europe

chapter 1|15 pages

Securing the Kingdom's Cyberspace

Cybersecurity and cyber intelligence in Spain

chapter 2|10 pages

Albania's Cybersecurity Pivot

Between Western architectures and great power competition

chapter 3|15 pages

Armenian National Policy in Cyber Space

Toward a global cyber security architecture

chapter 4|11 pages

Czech Republic

A new cyber security leader in Central Europe

chapter 6|16 pages

Germany's Cybersecurity Strategy

Confronting future challenges

chapter 7|10 pages

Cybersecurity of Poland

Legal and organizational framework

chapter 9|10 pages

Romanian Cybersecurity Efforts

A work in progress

chapter 11|11 pages

Dutch Cyber Security Strategy

chapter 12|10 pages

Norwegian Cyber Security

A small-state approach to building international cyber cooperation

chapter 13|12 pages

Seeking a New Order for Global Cybersecurity

The Russian approach to cyber-sovereignty

chapter 14|11 pages

Slovakia

The Tatra Tiger without teeth

chapter 15|9 pages

Slovenia

A fragmented cyber security

chapter 16|6 pages

In the Line of Russian Aggression

Ukraine, hybrid warfare, and cybersecurity defense

chapter 17|10 pages

United Kingdom

Pragmatism and adaptability in the cyber realm

chapter 18|10 pages

European Union

Policy, cohesion, and supranational experiences with cybersecurity

chapter 19|15 pages

Estonia

From the “Bronze Night” to cybersecurity pioneers

part II|143 pages

Asia and Australia

chapter 22|9 pages

An Effective Shield?

Analyzing South Korea's cybersecurity strategy

chapter 23|8 pages

In the Line of Fire

Taiwan's legal, political, and technological cybersecurity posture

chapter 24|13 pages

Serving the People

China's cybersecurity policy and its implications

chapter 25|18 pages

Cybersecurity in a One-Party State

Policies and implications for Vietnam's economy and online freedom

chapter 26|10 pages

The Philippines' Cybersecurity Strategy

Strengthening partnerships to enhance cybersecurity capability

chapter 27|12 pages

Malaysia

Balancing national development, national security, and cybersecurity policy

chapter 28|12 pages

Cyber Governance and Data Protection in India

A critical legal analysis

chapter 29|7 pages

Cybersecurity

A national priority for Bangladesh

chapter 30|11 pages

Managing a Digital Revolution

Cyber security capacity building in Myanmar 1

chapter 31|14 pages

Australia's Cyber Security

A unique opportunity

chapter 32|11 pages

Singapore

A leading actor in ASEAN cybersecurity

part III|55 pages

The Middle East

chapter 33|14 pages

Between Multi-stakeholderism and Cyber Sovereignty

Understanding Turkey's cybersecurity strategy

chapter 34|9 pages

Israel

Cyber defense and security as national trademarks of international legitimacy

chapter 35|9 pages

Palestine 1

Whose cyber security without cyber sovereignty?

chapter 36|8 pages

The “Silicon Valley of the Middle East”

Cybersecurity, Saudi Arabia, and the path to Vision 2030

chapter 37|13 pages

The Islamic Republic of Iran's Cyber Security Strategy

Challenges in an era of cyber uncertainty

part IV|70 pages

The Americas

chapter 38|12 pages

Canada's Cyber Security in a Globalized Environment

Challenges and opportunities

chapter 39|10 pages

The United States

A declining hegemon in cyberspace?

chapter 40|11 pages

Jamaica's Cybercrime and Cyber-Security

Policies, laws, and strategies

chapter 41|10 pages

Mexico and Cybersecurity

Policies, challenges, and concerns

chapter 42|10 pages

Colombia's Cybersecurity Predicament

State making, strategic challenges, and cyberspace

chapter 43|15 pages

Cyber Security Governance in Brazil

Keeping silos or building bridges?

part V|104 pages

Africa

chapter 44|13 pages

Securitizing CyberSpace in Egypt

The dilemma of cybersecurity and democracy

chapter 45|9 pages

Security through the Arab Winter

Cyber strategies in post-revolutionary Tunisia

chapter 46|10 pages

Cyber Security in Kenya

Balancing economic security and internet freedom

chapter 47|11 pages

Cybersecurity Policy in Nigeria

A tool for national security and economic prosperity

chapter 48|9 pages

Cybersecurity in Ghana

Past, present, and future

chapter 49|18 pages

Building a Cyber Fortress in Africa

Uganda's cyber security capacities and challenges

chapter 50|17 pages

Cybersecurity in South Africa

Status, governance, and prospects

chapter 51|15 pages

Algorithms of Oppression?

AU's cybersecurity policy and its enforcement in Africa