Skip to main content
Top
Published in:
Cover of the book

2022 | OriginalPaper | Chapter

1. A Case for Cybersecurity Awareness Systems

Authors : Thomas Schaberreiter, Gerald Quirchmayr, Alexandros Papanikolaou

Published in: Cybersecurity Awareness

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

This Chapter intends to provide the context and environment leading to the development of the CS-AWARE cybersecurity awareness solution, which was comprehensively piloted and evaluated in the local public administration (LPA) use case during the CS-AWARE H2020 European research and innovation project. The Chapter assesses the main factors driving cybersecurity from a holistic multi-angle perspective, and reviews the currently actively developing European legislative cybersecurity environment, which is introducing a multi-level cybersecurity framework centred around awareness and cooperation/collaboration. Furthermore, this Chapter highlights in more detail the specific cybersecurity requirements for LPAs, which is heavily focused on the critical data they manage, and emphasizes why cybersecurity awareness plays such a crucial role in future collaborative cybersecurity in Europe, and why significant cybersecurity gains can be achieved by introducing awareness and collaboration in the context of cybersecurity management in organizations like LPAs. In the conclusion of this Chapter, we provide a brief outlook on the following chapters, which present the key aspects of the CS-AWARE cybersecurity awareness solution in greater detail.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
2
Having regard to the state of the art, those measures shall ensure a level of security of network and information systems appropriate to the risk posed […] (Article 16 (1) NIS Directive).
 
3
GDR Article 30 “Notification of a personal data breach to the supervisory authority”; GDPR Article 31 “Communication of a personal data breach to the data subject”.
 
4
NIS Directive Article 14 “Security requirements and incident notification”.
 
Literature
go back to reference Commission of the European Communities. (2006). COMMUNICATION FROM THE COMMISSION on a European Programme for Critical Infrastructure Protection (COM(2006) 786 final). Commission of the European Communities. (2006). COMMUNICATION FROM THE COMMISSION on a European Programme for Critical Infrastructure Protection (COM(2006) 786 final).
go back to reference Coppolino, L., D’Antonio, S., Mazzeo, G., Romano, L., & Sgaglione, L. (2018). How to protect public administration from cybersecurity threats: The COMPACT project. In 2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA) (pp. 573–578). https://doi.org/10.1109/WAINA.2018.00147CrossRef Coppolino, L., D’Antonio, S., Mazzeo, G., Romano, L., & Sgaglione, L. (2018). How to protect public administration from cybersecurity threats: The COMPACT project. In 2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA) (pp. 573–578). https://​doi.​org/​10.​1109/​WAINA.​2018.​00147CrossRef
go back to reference ENISA. (2020). Cybersecurity certification. EUCC, a candidate cybersecurity certification scheme to serve as a successor to the existing SOG-IS (No. V1.0, 01/07/2020; p. 283). European Union Agency for Cybersecurity. ENISA. (2020). Cybersecurity certification. EUCC, a candidate cybersecurity certification scheme to serve as a successor to the existing SOG-IS (No. V1.0, 01/07/2020; p. 283). European Union Agency for Cybersecurity.
go back to reference European Commission. (2020a). Proposal for a DIRECTIVE OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL on measures for a high common level of cybersecurity across the Union, repealing Directive (EU) 2016/1148 (COM(2020) 823 final, 2020/0359 (COD)). European Commission. (2020a). Proposal for a DIRECTIVE OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL on measures for a high common level of cybersecurity across the Union, repealing Directive (EU) 2016/1148 (COM(2020) 823 final, 2020/0359 (COD)).
go back to reference European Commission. (2020b). Proposal for a DIRECTIVE OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL on THE resilience of critical entities (2020/0365 (COD)). European Commission. (2020b). Proposal for a DIRECTIVE OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL on THE resilience of critical entities (2020/0365 (COD)).
go back to reference European Parliament. (2016a). Directive (EU) 2016/1148 of the European Parliament and of the Council of 6 July 2016 concerning measures for a high common level of security of network and information systems across the Union. Official Journal of the European Union, L194/1. European Parliament. (2016a). Directive (EU) 2016/1148 of the European Parliament and of the Council of 6 July 2016 concerning measures for a high common level of security of network and information systems across the Union. Official Journal of the European Union, L194/1.
go back to reference European Parliament. (2018). Directive (EU) 2018/1972 of the European Parliament and of the Council of 11 December 2018 establishing the European Electronic Communications Code (Recast)Text with EEA relevance. Official Journal of the European Union, L321(36), 179. European Parliament. (2018). Directive (EU) 2018/1972 of the European Parliament and of the Council of 11 December 2018 establishing the European Electronic Communications Code (Recast)Text with EEA relevance. Official Journal of the European Union, L321(36), 179.
go back to reference European Parliament. (2019). Regulation 2019/881 of the European Parliament and of the Council on ENISA and on information and communication technology cybersecurity certification. Official journal of the European Union, L151/15. European Parliament. (2019). Regulation 2019/881 of the European Parliament and of the Council on ENISA and on information and communication technology cybersecurity certification. Official journal of the European Union, L151/15.
go back to reference Europol. (2019). Internet organised crime threat assessment 2019. European Union Agency for Law Enforcement Cooperation. Europol. (2019). Internet organised crime threat assessment 2019. European Union Agency for Law Enforcement Cooperation.
go back to reference Europol. (2021). Internet organised crime threat assessment 2021. European Union Agency for Law Enforcement Cooperation. Europol. (2021). Internet organised crime threat assessment 2021. European Union Agency for Law Enforcement Cooperation.
go back to reference Hsiao, S.-C., & Kao, D.-Y. (2018). The static analysis of WannaCry ransomware. International Conference on Advanced Communications Technology (ICACT), 153–158. Hsiao, S.-C., & Kao, D.-Y. (2018). The static analysis of WannaCry ransomware. International Conference on Advanced Communications Technology (ICACT), 153–158.
go back to reference Touhill, G. J., & Touhill, C. J. (2014). Cybersecurity for executives: A practical guide. John Wiley & Sons.CrossRef Touhill, G. J., & Touhill, C. J. (2014). Cybersecurity for executives: A practical guide. John Wiley & Sons.CrossRef
Metadata
Title
A Case for Cybersecurity Awareness Systems
Authors
Thomas Schaberreiter
Gerald Quirchmayr
Alexandros Papanikolaou
Copyright Year
2022
DOI
https://doi.org/10.1007/978-3-031-04227-0_1

Premium Partner