ABSTRACT

This chapter focuses on the development and implementation of cybersecurity policy. Policy requires a thorough, interdisciplinary analysis of the issue in order to develop the most effective responses to the threat posed by cyber attacks. Creating effective, cyber policy rooted in the limits of power requires narrowly defining what assets demand protection. This demands stakeholders to thoroughly and realistically analyze vulnerability and capability. Partner countries must work together to develop a coordinated international security plan. This plan must outline steps for coordinated travel security, border security, and for determining and acting on known and unknown threats. Cyber, and cybersecurity, more than anything else, accentuates, exacerbates, and highlights the powerful tension between the right to privacy and the obligation to protecting national security. Balancing is an imperfect equation reflecting both the reality of constantly moving threats and the never-ending efforts of cyber attackers to enhance their range, scope, and abilities.