ABSTRACT

The threat posed by cyber attacks on businesses, local governments, and critical infrastructures remains a key challenge in an increasingly connected world. According to the ENISA report on the threat landscape for 2016, an evolution in cyber threats has taken place. The top five threats reported by ENISA in 2016 were malware, Web-based attacks, Web application attacks, Botnets, and denial-of-service (DoS). Malware remains the top threat. The expected advantages of information sharing, with respect to improving the fierce cybersecurity situation in many countries, are manifold. The creation of threat intelligence inside the organization requires extensive monitoring, logging, and analytics—setting the capabilities up and keeping them efficiently running are not just technical, but also organizational challenges. Nation-states increasingly run national cybersecurity centers as public entities. Besides running national cybersecurity centers, a nation-state shapes information sharing activities through adaptations of the law. The chapter presents an overview of the key concepts discussed this book.