Skip to main content
Top

2018 | OriginalPaper | Chapter

38. Research and Education as Key Success Factors for Developing a Cybersecurity Culture

Authors : Solange Ghernaouti, Bastien Wanner

Published in: Cybersecurity Best Practices

Publisher: Springer Fachmedien Wiesbaden

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The development and deployment of a cybersecurity culture and best practices among all stakeholders are a crucial issue for the information society. Based on two innovative initiatives in the field of education and research issued by the University of Lausanne, this chapter points out mains stakes, challenges and constraints encountered by research activities in the field of cybersecurity and the fight against cybercrime, to improve skills, competences and measures that will contribute to obtain an effective cybersecurity culture.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
3.
go back to reference Solange Ghernaouti; ITU Regional Cybersecurity Forum for Europe and CIS, Sofia, Bulgaria, 07-09 October 2008. Solange Ghernaouti; ITU Regional Cybersecurity Forum for Europe and CIS, Sofia, Bulgaria, 07-09 October 2008.
4.
go back to reference S. Ghernaouti; “Cyberpower, crime, conflict and security in cyberspace” EPFL Press 2013. S. Ghernaouti; “Cyberpower, crime, conflict and security in cyberspace” EPFL Press 2013.
7.
go back to reference www.unil.ch/dcs This master is a result of a strong vision and deep understanding of the ongoing digital transformation of the society that have been carried out by professors P. Margot, L. Moreillon and by S. Ghernaouti who has been the first director of the Master. www.​unil.​ch/​dcs This master is a result of a strong vision and deep understanding of the ongoing digital transformation of the society that have been carried out by professors P. Margot, L. Moreillon and by S. Ghernaouti who has been the first director of the Master.
8.
go back to reference This master is a result of a strong vision and deep understanding of the ongoing digital transformation of the society that have been carried out by professors P. Margot, L. Moreillon and by S. Ghernaouti who has been the first director of the Master. This master is a result of a strong vision and deep understanding of the ongoing digital transformation of the society that have been carried out by professors P. Margot, L. Moreillon and by S. Ghernaouti who has been the first director of the Master.
go back to reference “The Fight against Cybercrime. Cooperation between CERTs and Law Enforcement Agencies in the fight against cybercrime” ENISA, 2012. “The Fight against Cybercrime. Cooperation between CERTs and Law Enforcement Agencies in the fight against cybercrime” ENISA, 2012.
go back to reference “Give and Take. Good Practice Guide for Addressing Network and Information Security”. ENISA, 2012. “Give and Take. Good Practice Guide for Addressing Network and Information Security”. ENISA, 2012.
go back to reference “Aspects of Cybercrime Legal, Regulatory and Operational Factors Affecting CERT Co-operation with Other Stakeholders” ENISA, 2012. “Aspects of Cybercrime Legal, Regulatory and Operational Factors Affecting CERT Co-operation with Other Stakeholders” ENISA, 2012.
go back to reference “The Directive on attacks against information systems, A Good Practice Collection for CERTs on the Directive on attacks against information systems” ENISA, 2013. “The Directive on attacks against information systems, A Good Practice Collection for CERTs on the Directive on attacks against information systems” ENISA, 2013.
go back to reference Akhgar Babak, Brewster Ben (Eds.) “Combatting Cybercrime and Cyberterrorism Challenges, Trends and Priorities”, Springer 2016. Akhgar Babak, Brewster Ben (Eds.) “Combatting Cybercrime and Cyberterrorism Challenges, Trends and Priorities”, Springer 2016.
go back to reference Solange Ghernaouti; “Cyberpower, crime, conflict and security in cyberspace” EPFL Press 2013. Solange Ghernaouti; “Cyberpower, crime, conflict and security in cyberspace” EPFL Press 2013.
go back to reference Solange Ghernaouti “Cyberpower: stakes and challenges for Europe” The European files, January 2016. Solange Ghernaouti “Cyberpower: stakes and challenges for Europe” The European files, January 2016.
go back to reference Solange Ghernaouti; “La cybercriminalité, les nouvelles armes de pouvoir” Lee savoir suisse, PPUR 2017. Solange Ghernaouti; “La cybercriminalité, les nouvelles armes de pouvoir” Lee savoir suisse, PPUR 2017.
go back to reference Thomas A. Johnson (editor); “Cybersecurity: Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare”, CRC Press 2015. Thomas A. Johnson (editor); “Cybersecurity: Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare”, CRC Press 2015.
go back to reference Report on the opportunities for deterring and fighting cybercrime across non ICT sectors. Deliverable D7.1 submitted in May 2016 in fulfilment of the requirements of the FP7 project, E-CRIME grant agreement n° 607775. Report on the opportunities for deterring and fighting cybercrime across non ICT sectors. Deliverable D7.1 submitted in May 2016 in fulfilment of the requirements of the FP7 project, E-CRIME grant agreement n° 607775.
go back to reference Christopher Hadnagy; “The Art of human hacking” Wiley Publishing Inc. 2011. Christopher Hadnagy; “The Art of human hacking” Wiley Publishing Inc. 2011.
go back to reference Kevin D. Mitnik; “The art of Deception: Controlling the human element of security”, Wiley Publishing Inc. 2002. Kevin D. Mitnik; “The art of Deception: Controlling the human element of security”, Wiley Publishing Inc. 2002.
Metadata
Title
Research and Education as Key Success Factors for Developing a Cybersecurity Culture
Authors
Solange Ghernaouti
Bastien Wanner
Copyright Year
2018
DOI
https://doi.org/10.1007/978-3-658-21655-9_38

Premium Partner