National Cyber Security Framework Manual
National Cyber Security Framework Manual
Alexander Klimburg (Ed.), National Cyber Security Framework Manual, NATO CCD COE Publication,
Tallinn 2012
2012 by NATO Cooperative Cyber Defence Centre of Excellence
All rights reserved. No part of this publication may be reprinted, reproduced, stored in a retrieval system or
transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without
the prior written permission of the NATO Cooperative Cyber Defence Centre of Excellence ([email protected]).
This restriction does not apply to making digital or hard copies of this publication for internal use within NATO,
and for personal or educational use when for non-proft or non-commercial purposes, providing that copies bear
a full citation.
PRINTED COPIES OF THIS PUBLICATION
ARE AVAILABLE FROM:
NATO CCD COE Publications
Filtri tee 12, 10132 Tallinn, Estonia
Phone: +372 717 6800
Fax: +372 717 6308
E-mail: [email protected]
Web: www.ccdcoe.org
LEGAL NOTICE
This publication contains opinions of the respective authors only. They do not necessarily refect the policy or the
opinion of NATO CCD COE, NATO, or any agency or any government. NATO CCD COE may not be held responsible
for any loss or harm arising from the use of information contained in this book and is not responsible for the
content of the external sources, including external websites referenced in this publication.
Print: O Greif Trkikoda
Cover design & content layout: Marko Snurm
ISBN 978-9949-9211-1-9 (print)
ISBN 978-9949-9211-2-6 (pdf)
ISBN 978-9949-9211-3-3 (epub)
NATIONAL CYBER SECURITY
FRAMEWORK MANUAL
EDITED BY
ALEXANDER KLIMBURG
NATO Cooperative Cyber Defence Centre of Excellence
ABOUT THE NATO CCD COE
The NATO Cooperative Cyber Defence Centre of Excellence (NATO CCD COE) is an
international military organisation accredited in 2008 by NATOs North Atlantic
Council as a Centre of Excellence. Located in Tallinn, Estonia, the Centre is currently
supported by Estonia, Germany, Hungary, Italy, Latvia, Lithuania, the Netherlands,
Poland, Slovakia, Spain, and the USA as Sponsoring Nations. The Centre is not part
of NATOs command or force structure, nor is it funded by NATO. However, it is part
of a wider framework supporting NATO Command Arrangements.
The NATO CCD COEs mission is to enhance capability, cooperation and information
sharing between NATO, NATO Member States and NATOs partner countries in
the area of cyber defence by virtue of research, education and consultation. The
Centre has taken a NATO-orientated, interdisciplinary approach to its key activities,
including: academic research on selected topics relevant to the cyber domain from
legal, policy, strategic, doctrinal and/or technical perspectives; providing education
and training, organising conferences, workshops and cyber defence exercises, and
ofering consultancy upon request.
For more information on the NATO CCD COE, please visit the Centres website at
http://www.ccdcoe.org.
For information on Centres of Excellence, visit NATOs website Centres of
Excellence at http://www.nato.int/cps/en/natolive/topics_68372.htm.
ACKNOWLEDGEMENTS
Special gratitude for contributions to the discussions during workshops supporting
the elaboration of this publication is owed to:
Jart Armin, CEO, CyberDefcon and Editor, HostExploit
Prof Dr Paul Cornish, Professor of International Security, University of Bath
Prof Dr Chris Demchak, US Naval War College, Strategic Research Department/
NWC Center for Cyber Confict Studies
Maeve Dion, Institute for Law & IT, Faculty of Law, Stockholm University
Yurie Ito, Director, Global Coordination, JPCERT/CC
John C. Mallery, Research Scientist, Computer Science & Artifcial Intelligence
Laboratory, Massachusetts Institute of Technology (MIT)
Philipp Mirtl, Fellow and Adviser, Austrian Institute for International Afairs (oiip)
Jef Moss, Vice President and Chief Security Ofcer, Internet Corporation for
Assigned Names and Numbers (ICANN)
Greg Rattray, CEO and Founding Partner, Delta Risk LLC
LTC Jan Stinissen (NLD-A), Legal & Policy Branch, NATO CCD COE
Heli Tiirmaa-Klaar, Cyber Security Advisor, Security Policy and Confict Prevention
Directorate, European External Action Service, EU
The participants of the workshops are not responsible for the contents of this
publication, as the fnal decision in regard to the content was taken by the editor in
coordination with the NATO CCD COE.
VI
CONTENTS
Foreword . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . X
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . XII
Executive Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . XV
1. Preliminary Considerations: On National Cyber Security . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Melissa E. Hathaway, Alexander Klimburg
1.1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.1.1. Cyber: Converging Dependencies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.1.2. The Cost of Connectivity. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
1.2. Cyber Terms and Defnitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
1.2.1. Information, ICT, and Cyber Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
1.2.2. Cyber Crime . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
1.2.3. Cyber Espionage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
1.2.4. Cyber Warfare. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
1.3. National Cyber Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
1.3.1. Comparison of National and Cyber Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
1.3.2. Cyber Power and National Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
1.4. Conceptualising National Cyber Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
1.4.1. The Three Dimensions: Governmental, National and International . . . . . . . . . . . . . . . . . . 29
1.4.2. The Five Mandates of National Cyber Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
1.5. The Five Dilemmas of National Cyber Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
1.5.1. Stimulate the Economy vs. Improve National Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
1.5.2. Infrastructure Modernisation vs. Critical Infrastructure Protection . . . . . . . . . . . . . . . . . 36
1.5.3. Private Sector vs. Public Sector . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
1.5.4. Data Protection vs. Information Sharing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
1.5.5. Freedom of Expression vs. Political Stability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
1.6. Conclusion. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
2. Political Aims & Policy Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
Gustav Lindstrom, Eric Luiijf
2.1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
2.1.1. Aims of National Security Strategies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
2.1.2. Trends in National Security Strategy Formulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
2.1.3. Integrating Cyber Security in National Security Strategies . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
2.2. The National Cyber Security Dimension . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
VII
2.2.1. Themes in National Cyber Security Strategies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
2.2.2. Aims and Addressees . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
2.3. Implementing Cyber Security Strategies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
2.3.1. The Use of Terms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
2.3.2. The Role of Transparency . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
2.3.3. Addressing Stakeholders . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
2.4. Political Pitfalls, Frictions and Lessons Identifed . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
3. Strategic Goals & Stakeholders . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
Alexander Klimburg, Jason Healey
3.1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
3.1.1. National Cyber Security Actors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
3.1.2. National Cyber Security Advantages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
3.1.3. Ofensive Actions in Cyber . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
3.1.4. Defensive Actions in Cyber . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
3.1.5. Collective Cyber Defence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
3.2. Strategic Concepts: Balancing Defensive and Ofensive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
3.2.1. Deterrence: Cost Imposed . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82
3.2.2. Resilience: Beneft Denied . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84
3.3. Two Tensions of National Cyber Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
3.3.1. Military vs. Civilian Approaches . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
3.3.2. The Law Enforcement vs. Intelligence Community Approaches . . . . . . . . . . . . . . . . . . . . . 87
3.4. Strategy Development Processes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
3.4.1. Bottom-Up, Top-Down and Re-Iterative . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
3.4.2. Governmental vs. Societal Approaches . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
3.4.3. Resources, Budgets and Metrics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
3.5. Engagement with Stakeholders . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
3.5.1. Whole of Government (WoG) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
3.5.2. Whole of Nation (WoN) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
3.5.3. Whole of System (WoS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
3.5.4. National Cyber Security: Coordinate, Cooperate and Collaborate . . . . . . . . . . . . . . . . . 101
3.6. Strategic Pitfalls, Frictions and Lessons Identifed . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103
4. Organisational Structures & Considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108
Eric Luiijf, Jason Healey
4.1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109
4.2. Delineating Organisational Functions, Capabilities and Responsibilities . . . . 109
4.2.1. Across the Levels of Government . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110
VIII
4.2.2. Across the Incident Management Cycle . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112
4.3. Cyber Security Stakeholders . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114
4.4. Main Focus of Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116
4.4.1. Along the Mandates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116
4.4.2. Along the Cross-Mandates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119
4.5. The Five Mandates of National Cyber Security. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120
4.5.1. Military Cyber Operations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121
4.5.2. Counter Cyber Crime . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122
4.5.3. Intelligence/Counter-Intelligence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
4.5.4. Cyber Security Crisis Management and CIP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124
4.5.5. Internet Governance and Cyber Diplomacy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127
4.6. The Three Cross-Mandates Activities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129
4.6.1. Coordination . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130
4.6.2. Information Exchange and Data Protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132
4.6.3. Research & Development and Education . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133
4.7. International Cyber Security Organisations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134
4.7.1. Government-Focused Activities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135
4.7.2. Nation-Focused Activities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137
4.7.3. System-Focused Activities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138
4.8. Organisational Pitfalls, Frictions and Lessons Identifed . . . . . . . . . . . . . . . . . . . . . . . . . . . 140
5. Commitments, Mechanisms & Governance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146
Victoria Ekstedt, Tom Parkhouse, Dave Clemente
5.1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146
5.2. Nature of State Commitments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149
5.2.1. Legal Commitments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150
5.2.2. Cyber-Enabled Terrorism . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155
5.2.3. Cyber Espionage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157
5.2.4. Cyber Criminality . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 158
5.2.5. Convention on Cybercrime . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160
5.2.6. Human Rights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163
5.2.7. International Humanitarian Law . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 166
5.2.8. Legal Thresholds . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 168
5.3. Interpretation of Commitments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170
5.3.1. Governance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171
5.3.2. Assurance Mechanisms: Information Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175
5.4. NATOs Cyber Dimension . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 180
5.4.1. NATOs Collective/Cyber Defence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 182
IX
5.4.2. Cooperation with Non-NATO Nations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185
5.4.3. NATO-EU Cooperation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 186
5.4.4. The NATO Defence Planning Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187
5.5. Conclusion. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 188
5.6. Tactical/Technical Pitfalls, Frictions and Lessons Identifed . . . . . . . . . . . . . . . . . . . . . . 189
6. Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191
6.1. The Road so Far . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191
6.2. Final Remarks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 195
Annex: List of Principal Guidelines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 196
Bibliography . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 203
Glossary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 225
Authors Biographies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233
Figures
Figure 1: Relationship between Cyber Security and other Security Domains ...................................................... 10
Figure 2: Parsing Cyber Ofense ............................................................................................................................................. 78
Figure 3: The Four Levels of War as a Generalised Tool for Analysis ..................................................................111
Figure 4: The Five Mandates and the Six Elements of the Cyber Security Incident Cycle Model ...............118
Figure 5: The Cross-Mandates and the Six Elements of the Cyber Security Incident Cycle Model ..........120
Figure 6: The Organisational Picture Across Mandates ..............................................................................................129
Figure 7: The Organisational Picture of the Cross-Mandates ...................................................................................134
Tables
Table 1: The Core Theoretical Approaches..................................................................................................................... XVI
Table 2: Today and the Near Future ....................................................................................................................................... 4
Table 3: National (Cyber) Security Strategies in Selected OECD Countries ......................................................... 23
Table 4: Comparison of Threats and Vulnerabilities ..................................................................................................... 48
Table 5: Examples of National Cyber Security Strategies ........................................................................................... 53
Table 6: Diferences Between WoG, WoN and WoS ....................................................................................................100
X
FOREWORD
Information and communications technologies have become indispensable to the
modern lifestyle. We depend on information and communications infrastructure
in governing our societies, conducting business, and exercising our rights and
freedoms as citizens. In the same way, nations have become dependent on their
information and communications infrastructure and threats against its availability,
integrity and confdentiality can afect the very functioning of our societies.
The security of a nations online environment is dependent on a number of
stakeholders with difering needs and roles. From the user of public communications
services to the Internet Service Provider supplying the infrastructure and handling
everyday functioning of services, to the entities ensuring a nations internal and
external security interests every user of an information system afects the level
of resistance of the national information infrastructure to cyber threats. Successful
national cyber security strategies must take into consideration all the concerned
stakeholders, the need for their awareness of their responsibilities and the need
to provide them with the necessary means to carry out their tasks. Also, national
cyber security cannot be viewed as merely a sectoral responsibility: it requires a
coordinated efort of all stakeholders. Therefore, collaboration is a common thread
that runs through most of the currently available national strategies and policies.
Moreover, the diferent national cyber security strategies represent another
common understanding: while national policies are bound by the borders of
national sovereignty, they address an environment based on both infrastructure
and functioning logic that has no regard for national boundaries. Cyber security
is an international challenge, which requires international cooperation in order to
successfully attain an acceptable level of security on a global level.
National interests tend to have priority over common interests and this is an
approach which may be difcult to change, if it needs changing at all. As long as we
can fnd the common ground and discuss the problematic issues out in the open,
national interests should not impede international cooperation.
The task of drafting a national cyber security strategy is a complex one. In addition
to the versatile threat landscape and the various players involved, the measures to
address cyber threats come from a number of diferent areas. They can be political,
technological, legal, economic, managerial or military in nature, or can involve
other disciplines appropriate for the particular risks. All of these competences
need to come together to ofer responses capable of strengthening security and
resisting threats in unison, rather than in competition for a more prominent role or
for resources. Also, any security measures foreseen must consistently be balanced
XI
against basic rights and freedoms and their efects on the economic environment
must be considered. In the end, it is important to understand that cyber security is
not an isolated objective, but rather a system of safeguards and responsibilities to
ensure the functioning of open and modern societies.
We believe that this Manual will provide not only an appreciation for all the facets
that need to be considered in drafting a national cyber security strategy, but also
genuine tools and highly competent advice for this process. It is our hope that the
Manual will serve to further a higher level of cyber security both on the national
and international levels.
Artur Suzik
Colonel, EST-A
NATO CCD COE
Director
Tallinn, Estonia
November 2012
XII
INTRODUCTION
As stated in the Strategic Concept for the Defence and Security of the Members
of the North Atlantic Treaty Organisation of November 2010, NATO Member
States have recognised that malicious cyber activities can reach a threshold
that threatens national and Euro-Atlantic prosperity, security and stability.
1
In
order to assure the security of NATOs territory and populations, the Alliance has
committed to continue fulflling its essential core tasks, inter alia, to deter and to
defend against emerging security challenges, such as cyber threats.
2
The revised
NATO Policy on Cyber Defence of 8 June 2011 focuses NATO on the protection of
its own communication and information systems in order to perform the Alliances
core tasks of collective defence and crisis management.
3
However, as cyber threats
transcend State borders and organisational boundaries, the policy also stresses the
need for cooperation of the Alliance with NATO partner countries, private sector
and academia.
4
NATO Member States reinforced the importance of international
cooperation by stating in the Chicago Summit Declaration of May 2012 that [t]o
address the cyber security threats and to improve our common security, we are
committed to engage with relevant partner countries on a case-by-case basis and
with international organisations [...] in order to increase concrete cooperation.
5
Against this background, it is of paramount importance to increase the level
of protection against cyber threats and to steadily improve the abilities to
appropriately address cyber threats by Allies and NATOs partner countries. The
National Cyber Security Framework Manual addresses national cyber security
stakeholders in NATO Member States or NATO partner countries, including leaders,
legislators, regulators and Internet Service Providers. It will serve as a guide to
develop, improve or confrm national policies, laws and regulations, decision-
making processes and other aspects relevant to national cyber security. Hence, this
Manual will support NATOs goal of enhancing the common security with regard
1
Active Engagement, Modern Defence. Strategic Concept for the Defence and Security of the Members
of the North Atlantic Treaty Organisation, adopted by Heads of State and Government at the NATO
in Lisbon 19-20 November 2010, at para. 12, available at http://www.nato.int/strategic-concept/pdf/
Strat_Concept_web_en.pdf.
2
Ibid., at para 4.a); Defending the networks. The NATO Policy on Cyber Defence, available at http://www.
nato.int/nato_static/assets/pdf/pdf_2011_09/20111004_110914-policy-cyberdefence.pdf.
3
Defending the networks. The NATO Policy on Cyber Defence, available at http://www.nato.int/nato_
static/assets/pdf/pdf_2011_09/20111004_110914-policy-cyberdefence.pdf.
4
Information available at the NATO website NATO and cyber defence, available at http://www.nato.int/
cps/en/SID-714ABCE0-30D8F09C/natolive/topics_78170.htm.
5
Chicago Summit Declaration, Issued by the Heads of State and Government participating in the meeting
of the North Atlantic Council in Chicago on 20 May 2012, at para. 49, available at http://www.nato.int/
cps/en/SID-D03EFAB6-46AC90F8/natolive/ofcial_texts_87593.htm?selectedLocale=en.
XIII
to cyber security threats, as expressed by the Allies in the aforementioned Chicago
Summit Declaration.
The implementation, maintenance and improvement of national cyber security
comprises a range of elements. These can address strategic documents of political
nature, laws, regulations, organisational and administrative measures, such as
communication and crisis management procedures within a State, but also purely
technical protection measures. Furthermore, awareness raising, training, education,
exercises and international cooperation are important features of national cyber
security. Thus, the aspects to be considered reach from the strategic through the
administrative or operational to the tactical level. This Manual addresses all of
those levels in the various sections, shows diferent possibilities of approaches to
national cyber security, and highlights good practices within national cyber security
strategies and techniques. This approach is based on the reasoning that States have
diferent features and prerequisites with regard to their legal framework, historical
and political contexts, governmental structure, organisational structures, crisis
management processes, and mentality. Therefore, this Manual cannot provide
a blueprint which would be feasible and useful for all States, but rather shows
diverse aspects and possibilities to be considered in the course of drafting a national
cyber security strategy. Due to its rather academic approach although being of
practical use and the incorporation of military aspects, the Manual difers from
publications with a similar goal and target audience.
The editor and the authors of the manual are internationally recognised experts
in the arena of cyber security and cyber defence, representing a diversity of
nationalities and disciplines, and showing a variety of professional backgrounds
and experience. Their biographies, which can be found at the end of this volume,
provide a more detailed illustration of their expertise.
The publication was elaborated within the context of a project funded by the NATOs
Science for Peace and Security Programme (NATO SPS Programme), a policy tool
for enhancing cooperation and dialogue with all partners, based on civil science
and innovation, to contribute to the Alliances core goals and to address the priority
areas for dialogue and cooperation identifed in the new partnership policy.
6
The
project consisted of three workshops with the participation of experts from various
disciplines and from diferent NATO Member States and partner countries. The
workshops discussed, at high level and in a round-table setting, diferent national
policy approaches to the cyber domain. The experts represented a supranational
organisation (EU), diverse governmental agencies, including the military, academia,
6
See NATO SPS website, available at http://www.nato.int/cps/en/SID-51871B1B-CD538A0D/natolive/
topics_85373.htm.
XIV
think tanks, private companies and NGOs. Many of them have extensive professional
experience in advising governmental entities with regard to national cyber security
or aspects thereof. The three workshops
7
directly supported the present publication
by generating discussions between the experts gathered, including the authors of
the manual and the NATO CCD COE project manager. This publication was funded
by the aforementioned NATO SPS Programme.
We hope that this volume will prove to be a valuable tool supporting NATO Member
States and NATO partner countries, as well as all stakeholders in cyber security, in
improving their ability to appropriately address cyber threats. In this way, it will
directly support NATOs strategic goal to improve the level of cyber defence within
the geographic scope of the Alliance and its partner countries.
Last but not least, we would like to thank all the authors and the editor for their
superb contributions and friendly cooperation in the course of the publication
process.
Dr Katharina Ziolkowski
DEU-Civ
NATO CCD COE
Project Manager
Tallinn, Estonia
November 2012
7
The frst workshop was held by NATO CCD COE in Austria in cooperation with the Austrian Institute for
International Afairs. The second workshop was held in Sweden in cooperation with the Swedish Armed
Forces Computer Network Operations Unit. The third workshop was conducted by NATO CCD COE in
Geneva in cooperation with the Geneva Centre for Security Policy (GCSP).
XV
EXECUTIVE SUMMARY
The term national cyber security is increasingly used in policy discussions,
but hardly ever defned. In this, it is very similar to the wider subject of cyber
security itself where common interpretations and implied meanings are much
more frequent than universally accepted and legally-binding defnitions. In cyber
security, as a rule, the individual national context will defne the specifc defnitions,
which in turn will defne the specifc approaches there are very few fxed points
in cyber security.
Accordingly, the National Cyber Security Framework Manual does not strive
to provide a single universally applicable checklist of things to consider when
drafting a national cyber security strategy. Rather, it provides detailed background
information and theoretical frameworks to help the reader understand the diferent
facets of national cyber security, according to diferent levels of public policy
formulation. The four levels of government political, strategic, operational and
tactical (technical) each have their own perspectives on national cyber security,
and each is addressed in individual sections. Additionally, throughout the Manual
there are call-out boxes that give examples of relevant institutions in national
cyber security, from top-level policy coordination bodies down to cyber crisis
management structures and similar institutions. The Manual can thus be read as
a collective volume or on a section-by-section basis, according to the needs of the
reader.
Section 1 (Preliminary Considerations) provides an introduction to the
general topic of national cyber security. Particular attention is paid to terms and
defnitions: the use of certain terms (such as cyber security rather than internet
security) is connected not only to diferent policy choices, but also develops out
of fundamentally diferent world-views. National cyber security is examined in
relation to various national defnitions of cyber security and national security. Also,
an overall defnition of national cyber security is ofered. Further, the overall theory
is presented that national cyber security efectively amounts to the precarious
equilibrium of various contradictory needs efectively Five Dilemmas that need
to be balanced.
Section 2 (Political Aims) considers the role that national security plays at the top
level of security policy formulation. Since the end of the Cold War, a number of new
threats and risk factors have competed for the attention of policy-makers. Cyber
security is only one of these new issues that need to be considered. However, there
is an increasing shift towards seeing cyber security as one of the most important
of these new challenges. An analysis of 20 national cyber security strategies shows
that there are diverging defnitions of both cyberspace and cyber security. While all
XVI
strategies understand the centrality of working with diferent stakeholders, many
strategies lack efective engagement mechanisms for defning those relationships.
Table 1: The Core Theoretical Approaches
National Cyber Security
(NCS)
Defned
The focused application of specifc governmental levers and informa-
tion assurance principles to public, private and relevant international
ICT systems, and their associated content, where these systems
directly pertain to national security.
The 5 Mandates
Diferent
interpretations of NCS &
common activities
- Military Cyber
- Counter Cyber Crime
- Intelligence and Counter-Intelligence
- Critical Infrastructure Protection and National Crisis Management
- Cyber Diplomacy and Internet Governance
+ 3 Cross Mandates: coordination, information exchange and data
protection, research & development and education
The 3 Dimensions
Diferent stakeholder groups
in NCS
- Governmental (central, state, local) coordination
- National (CIP/contactors, security companies, civil society) co-
operation
- International (legal, political and industry frameworks) collabora-
tion
The 5 Dilemmas
Balancing the cost and
benefts of NCS
- Stimulate the Economy vs. Improve National Security
- Infrastructure Modernisation vs. Critical Infrastructure Protection
- Private Sector vs. Public Sector
- Data Protection vs. Information Sharing
- Freedom of Expression vs. Political Stability
Section 3 (Strategic Goals) evaluates key elements of cyber security within
national security. The centrality of ofensive and defensive activities in cyberspace,
the variety of actors that engage in these activities, and the tensions that arise
through various institutional heritages are examined from the perspective of
developing strategic goals to ft a specifc national security requirement. The
importance of understanding diferent stakeholder groups in national cyber
security is incorporated into a theory of the Three Dimensions of cyber security
where governmental, societal and international stakeholders need to work together
in order to succeed.
Section 4 (Organisational Considerations) emphasises the Five Mandates (or
interpretations) of national cyber security and their over-arching cross-mandate
activities. Each of the Five Mandates has a diferent set of requirements and
goals that need to be brought into proper relationship with each other. Moreover,
three cross-mandates are highlighted. Adapting the incident management model
XVII
to these mandates, a possible distribution of cyber security-related tasks within a
governmental framework is ofered. Additionally, the importance of collaboration
with a number of international organisations is highlighted as a key factor for
efective national cyber security.
Section 5 (Commitments, Mechanisms and Governance) explores some of the
legal and governance frameworks for actually delivering operational national
cyber security. In particular, relevant international agreements and regulations,
such as the Council of Europe Convention on Cybercrime and the International
Humanitarian Law, are examined with a view towards their implications for
operational cyber security. The wider framework of NATO collaboration, both for
Member States and partners, is considered as well.
Section 6 (Conclusion) summarises some of the previous points, and illustrates
the need for national cyber security in both developing and developed nations, even
though the very concept is likely to change in the medium- and long-term future.
The National Cyber Security Framework Manual is intended to provide both
academics and policy-makers with an in-depth examination of the relevant
factors when dealing with cyber security within a national security context. The
theoretical frameworks employed are intended to help further understanding of
the various facets of the issue, not to prescribe a certain political or developmental
path. Indeed, national cyber security as a topic is sufciently complex that no one
individual approach can be seen as being universally valid across all nations and all
local circumstances. Like the very term itself, each interpretation of cyber security
is contingent on the position and purpose of the observer.
Alexander Klimburg
Vienna, Austria
September 2012
1 Preliminary Considerations: On National Cyber Security
1. PRELIMINARY CONSIDERATIONS: ON
NATIONAL CYBER SECURITY
Melissa E. Hathaway, Alexander Klimburg
1.1. INTRODUCTION
What, exactly, is national cyber security? There is little question that the advent of
the internet is having a decisive infuence on how national security is being defned.
Nations are increasingly facing the twin tensions of how to expedite the economic
benefts of ICT
1
and the internet-based economy while at the same time protecting
intellectual property, securing critical infrastructure and providing for national
security. Most nations electronic defences have been punctured and the potential
costs of these activities are considerable. More than one hundred nations have some
type of governmental cyber capability and at least ffty of them have published some
form of a cyber strategy defning what security means to their future national and
economic security initiatives.
2
There can be little doubt, therefore, that countries
have an urgent need to address cyber security on a national level. The question is
how this need is being formulated and addressed.
This section provides a context for how national cyber security can be conceived.
It provides an introduction, not only to the topic itself, but also to the Manual as a
whole, setting the scene for the further sections to explore in depth. Accordingly,
this section highlights the broad set of terms and missions being used to describe
the overall cyber environment. It examines how various nations integrate their
respective concepts of national security and cyber security, and proposes its own
defnition of what national cyber security could entail. Three conceptual tools are
introduced to help focus the strategic context and debate. These are termed the
three dimensions, the fve mandates, and the fve dilemmas of national cyber
security. As the reader will discover, each dimension, mandate and dilemma will
play a varying role in each nations attempt to formulate and execute a national
cyber security strategy according to their specifc conditions. This section, like
the Manual as a whole, does not attempt to prescribe a specifc set of tasks or a
checklist of issues that need to be resolved. Rather, it concentrates on helping to
formulate a conceptual picture of what national cyber security can entail.
1
Information and communications technology used interchangeably with the term information
technology (IT).
2
James A. Lewis and Katrina Timlin, Cybersecurity and Cyberwarfare. Preliminary Assessment of
National Doctrine and Organization, (Geneva: UNIDIR, 2011), http://www.unidir.org/pdf/ouvrages/
pdf-1-92-9045-011-J-en.pdf.
2 Introduction
1.1.1. Cyber: Converging Dependencies
The internet, together with the information communications technology (ICT) that
underpins it, is a critical national resource for governments, a vital part of national
infrastructures, and a key driver of socio-economic growth and development.
Over the last forty years, and especially since the year 2000, governments and
businesses have embraced the internet, and ICTs potential to generate income and
employment, provide access to business and information, enable e-learning, and
facilitate government activities. In some countries the internet contributes up to 8%
of gross domestic product (GDP), and member countries of both the European Union
(EU) and the G20 have established goals to increase the internets contribution
to GDP.
3
This cyber environments value and potential is nurtured by private and
public sector investments in high-speed broadband networks and afordable mobile
internet access, and break-through innovations in computing power, smart power
grids, cloud computing, industrial automation networks, intelligent transport
systems, electronic banking, and mobile e-commerce.
The rise of the internet, and the increasing social dependence on it, did not occur
overnight. The frst internet transmission occurred in October 1969 with a simple
message between two universities. Now, 294 billion e-mail are sent per day. Internet
protocols evolved during the 1970s to allow for fle sharing and information exchange.
Now, in one day, enough information is generated and consumed to fll 168 million
DVDs. In 1983 there was a successful demonstration of the Domain Name System
(DNS) that provided the foundation for the massive expansion, popularisation and
commercialisation of the internet. E-commerce and the e-economy were made
possible in 1985 with the introduction of top-level-domains (e.g., .mil, .com, .edu,
.gov) and this growth was further fuelled in 1990 with the invention of the world
wide web which facilitated user-friendly information sharing and search services.
Today, nearly two-thirds of the internet-using population research products and
businesses online before engaging with them ofine, and most use search engines
like Google, Baidu, Yahoo, and Bing to complete that research. Social networks now
reach over 20% of the global population.
4
SMS trafc generates $812,000 every
minute.
5
3
David Dean et al., The Connected World: The Digital Manifesto: How Companies and Countries Can
Win in the Digital Economy, BCG. Perspectives, 27 January 2012.
4
comScore, Its a Social World: Top 10 Need-to-Knows About Social Networking and Where Its
Headed,http://www.comscore.com/Press_Events/Presentations_Whitepapers/2011/it_is_a_social_
world_top_10_need-to-knows_about_social_networking.
5
ITU-D, The World in 2010. ICT Fact and Figures, (Geneva: ITU, 2010), http://www.itu.int/ITU-D/ict/
material/FactsFigures2010.pdf.
3 Preliminary Considerations: On National Cyber Security
In 1996, the International Telecommunications Union (ITU) adopted a protocol
that allowed transmission of voice communication over a variety of networks.
This innovation gave way to additional technological breakthroughs like
videoconferencing and collaboration over IP networks. Today, 22 million hours of
television and movies are watched on Netfix and approximately 864,000 hours
of video are uploaded to YouTube per day.
6
Skype has over 31 million accounts
and the average Skype conversation lasts 27 minutes.
7
The mobile market has also
exploded, penetrating over 85% of the global population. 15% of the population use
their mobile phones to shop online and there are now more mobile phones on the
planet than there are people.
8
The internet economy has delivered economic growth at unprecedented scale,
fuelled by direct and ubiquitous communications infrastructures reaching almost
anyone, anywhere. At the same time, infrastructure modernisation eforts have
embraced the cost savings and efciency opportunities of ICT and the global reach
of the internet. Over the past decade, businesses replaced older equipment with
cheaper, faster, more ubiquitous hardware and software that can communicate with
the internet. At the heart of many of these critical infrastructures is an industrial
control system (ICS) that monitors processes and controls the fow of information.
Its functionality is like the on or of feature of a light switch. For example, an ICS can
adjust the fow of natural gas to a power generation facility, or the fow of electricity
from the grid to a home. Over the last decade, industry has increased connections
to and between critical infrastructures and their control system networks to reduce
costs and increase efciency of systems, sometimes at the expense of resiliency.
9
Today, businesses around the world tender services and products through the
internet to more than 2.5 billion citizens using secure protocols and electronic
payments. Services range from e-government, e-banking, e-health and e-learning
to next generation power grids, air trafc control and other essential services, all
of which depend on a single infrastructure.
10
The economic, technological, political
and social benefts of the internet are at risk, however, if it is not secure, protected
and available. Therefore, the availability, integrity and resilience of this core
infrastructure have emerged as national priorities for all nations.
6
Cara Pring, 100 Social Media, Mobile and Internet Statistics for 2012 (March), The Social Skinny, 21
March 2012.
7
Statistic Brain, Skype Statistics, Statistic Brain, 28 March 2012.
8
Edward Coram-James and Tom Skinner, Most Amazing Internet Statistics 2012, Funny Junk, http://
www.funnyjunk.com/channel/science/Most+Amazing+Internet+Statistics+2012/umiNGhz.
9
Melissa E. Hathaway, Leadership and Responsibility for Cybersecurity, Georgetown Journal of
International Afairs Special Issue (Forthcoming).
10
Services and applications include, but are not limited to: e-mail and text messaging, voice-over-IP-based
applications, streaming video and real-time video-conferencing, social networking, e-government,
e-banking, e-health, e-learning, mapping, search capabilities, e-books, and IPTV over the internet.
4 Introduction
It is anticipated that a decade from now, the internet will touch 60% of the worlds
population (over 5 billion citizens); will interlink more than 50 billion physical
objects and devices; and will contribute at least 10% of developing nations
GDP including China, Brazil, India, Nigeria and the Russian Federation.
11
These
predictions, if realised, will certainly alter politics, economics, social interaction
and national security. How countries nurture and protect this infrastructure will
vary. Hard choices and subtle tensions will have to be reconciled, because there are
at least two competing requirements under constrained fscal budgets: delivering
economic wellbeing and meeting the security needs of the nation.
Table 2: Today and the Near Future
12
Today 2020
Estimated World Popula-
tion
7 billion people ~8 billion people
Estimated Internet Popu-
lation
2.5 billion people
(35% of population is online)
~5 billion people
(60% of population is online)
Total Number of Devices
12.5 billion internet connected
physical objects and devices
(~6 devices per person)
50 billion internet connected
physical objects and devices
(~10 devices per person)
ICT Contribution to the
Economy
~4% of GDP on average for G20
nations
10% of worldwide GDP (and per-
haps more for developing nations)
1.1.2. The Cost of Connectivity
Governments around the world are pushing for citizen access to fast, reliable, and
afordable communications to meet the demand curve of the e-economy. This vision
is refected in the Organisation for Economic Co-operation and Developments
(OECD) Internet Economy; Europes Digital Agenda; the United States National
Broadband Plan, and in most ITU initiatives. A number of developing nations have
grasped the importance of ICT for development. Brazil, for instance, is in the middle
of a major upgrade to its broadband infrastructure.
13
Progress towards becoming
11
Dave Evans, The Internet of Things. How the Next Evolution of the Internet Is Changing Everything,
(San Jose, CA: Cisco Internet Business Solutions Group, 2011), http://www.cisco.com/web/about/ac79/
docs/innov/IoT_IBSG_0411FINAL.pdf.
12
Evans, The Internet of Things. How the Next Evolution of the Internet Is Changing Everything.
13
Angelica Mari, ITs Brazil: The National Broadband Plan itdecs.com, 26 July 2011.
5 Preliminary Considerations: On National Cyber Security
an advanced member of the information society is often measured in terms of
lower price-points, expanded bandwidth, increased speed and better quality of
service, expanded education and developed skills, increased access to content and
language, and targeted applications for low-end users.
14
But is the ITU measuring
the right things? Should the ITU also be measuring the attendant investments in the
security of that infrastructure, connectivity and information service? For example,
South Korea was ranked the most advanced nation in the ITUs information society
in terms of its internet penetration, high-speed broadband connections and ICT
usage; yet it was also ranked by the Internet security research frm Team Cymru
as Asia-Pacifcs leading host of peer-to-peer botnets.
15
South Korea is not the only
advanced nation to experience the challenges of connectivity. Highly-connected
countries are tempting targets for criminals.
16
In fact, according to Symantec,
the G20 nations harbour the majority of malicious code and infected computers.
Among the top three countries are China, Germany, and the United States; of those
three, the United States accounts for the highest number (23%) of all malicious
computer activity.
17
The internet is under siege and the volume, velocity, variety, and complexity of
the threats to the internet and globally connected infrastructures are steadily
increasing. For example, it is estimated that the G20 economies have lost 2.5 million
jobs to counterfeiting and piracy, and that governments and consumers lose $125
billion annually, including losses in tax revenue.
18
Organisations everywhere are
being penetrated, from small businesses to the worlds largest institutions. Criminals
have shown that they can harness bits and bytes with precision to deliver spam,
cast phishing attacks, facilitate click-fraud and launch distributed denial of service
(DDoS) attacks.
19
Attack toolkits sold in the underground economy for as little as
$40 allow criminals to create new malware and assemble an entire attack plan
14
ITU, Measuring the Information Society, (Geneva: ITU, 2011), http://www.itu.int/net/pressofce/
backgrounders/general/pdf/5.pdf. See also Melissa E. Hathaway and John E. Savage, Stewardship
of Cyberspace. Duties for Internet Service Providers, (Cambridge, MA: Belfer Center for Science and
International Afairs, 2012), http://belfercenter.ksg.harvard.edu/fles/cyberdialogue2012_hathaway-
savage.pdf.
15
Botnet: compromised, internet-connected computers typically used for illegal activities, usually
without the owners knowledge.
16
Reuters, South Korea discovers downside of high speed internet and real-name postings, The Guardian,
6 December 2011.
17
Ibid.
18
Frontier Economics Europe, Estimating the global economic and social impacts of counterfeiting and
piracy. A Report commissioned by Business Action to counterfeiting and piracy (BASCAP), (Paris:
ICCWBO, 2011), http://www.iccwbo.org/Data/Documents/Bascap/Global-Impacts-Study---Full-
Report.
19
See Melissa E. Hathaway, Falling Prey to Cybercrime: Implications for Business and the Economy,
in Securing Cyberspace: A New Domain for National Security, ed. Nicholas Burns and Jonathon Price
(Queenstown, MD: Aspen Institute, 2012).
6 Introduction
without having to be a software programmer.
20
In 2011, Symantec identifed over
400 million unique variants of malware that exposed and potentially exfltrated
personal, confdential, and proprietary data.
21
Many governments sufered data
breaches in 2011, including Australia, Brazil, Canada, India, France, New Zealand,
Russia, South Korea, Spain, Turkey, the Netherlands, the United Kingdom and the
United States. Hundreds of companies have also sufered signifcant breaches in
2011-2012, including Citigroup, e-Harmony, Epsilon, Linked-In, the Nasdaq, Sony
and Yahoo. One industry report estimates that over 175 million records were
breached and another industry report estimates that it cost enterprises 79
($125.55) per lost record,
22
excluding any fnes that may have been imposed for
violations of national data privacy laws.
At the same time, the pace of foreign economic collection and industrial espionage
activities against major corporations and governments is also accelerating. The
hyper-connectivity and relative anonymity provided by ICT lowers the risk of
being caught and makes espionage straightforward and attractive to conduct. In
recent testimony before the United States Congress, the Assistant Director of the
Counterintelligence Division of the FBI told lawmakers that the FBI is investigating
economic espionage cases responsible for $13 billion in losses to the US economy.
23
Some of the cases referenced include the targeting, penetration, and compromising
of companies that produce security products. In particular, certifcate authorities
including Comodo, DigiNotar, and RSA, fell prey to their own weak security
postures, which were subsequently exploited facilitating a wave of other computer
breaches.
24
Digital certifcates represent a second form of identity to help enhance
trust for fnancial or other private internet transactions by confrming that
something or someone is genuine.
25
These certifcates have become the de facto
credentials used for secure online communications and sensitive transactions,
such as online banking or accessing corporate e-mail from a home computer.
20
Symantec Corporation, Internet Security Threat Report: 2011 Trends, (Mountain View, CA: Symantec
Corporation, 2012), http://www.symantec.com/threatreport.
21
Ibid., 9.
22
Verizon, 2012 Data Breach Investigations Report, (Arlington, VA: Verizon Business, 2012), http://
www.verizonbusiness.com/resources/reports/rp_data-breach-investigations-report-2012_en_xg.pdf;
Ponemon Institute, 2010 Annual Study: U.K. Cost of a Data Breach. Compliance pressures, cyber
attacks targeting sensitive data drive leading IT organisations to sometimes pay more than necessary,
(Mountain View, CA: Symantec Corporation, 2011), http://www.symantec.com/content/en/us/about/
media/pdfs/UK_Ponemon_CODB_2010_031611.pdf?om_ext_cid=biz_socmed_twitter_facebook_
marketwire_linkedin_2011Mar_worldwide_costofdatabreach.
23
U.S. House of Representatives, Testimony: Before the Subcommittee on Counterterrorism and
Intelligence, Committee on Homeland Security, House of Representatives: Committee on Homeland
Security, 28 June 2012.
24
Hathaway, Leadership and Responsibility for Cybersecurity.
25
Certifcate Authorities issue secure socket layer (SSL) certifcates that help encrypt and authenticate
websites and other online services.
7 Preliminary Considerations: On National Cyber Security
During oral testimony before the US Senate Armed Services Committee, US
Army General Keith Alexander identifed China as the prime suspect behind the
RSA penetration and subsequent theft of intellectual property.
26
Perhaps the US
National Counter-Intelligence Executive put it best when he reported that, [m]any
states view economic espionage as an essential tool in achieving national security
and economic prosperity. Their economic espionage programs combine collection
of open source information, HUMINT, signals intelligence (SIGINT), and cyber
operations to include computer network intrusions and exploitation of insider
access to corporate and proprietary networks to develop information that could
give these states a competitive edge over the United States and other rivals.
27
Finally, unauthorised access, manipulation of data and networks, and destruction
of critical resources also threatens the integrity and resilience of critical core
infrastructures. The proliferation and replication of worms like Stuxnet, Flame, and
Duqu that can penetrate and establish control over remote systems is alarming.
In an April 2012 newsletter, the Industrial Control System Computer Emergency
Readiness Team (ICS-CERT) disclosed that it was investigating attempted intrusions
into what it described as multiple natural gas pipeline sector organisations. It
went on to say that the analysis of the malware and artefacts associated with this
activity was related to a single campaign with the initial penetration, resulting
from spear-phishing multiple personnel.
28
While the Stuxnet attack against Iran
was quite sophisticated, it does not necessarily require a strong industrial base or
a well-fnanced operation to fnd ICS vulnerabilities teenagers regularly are able
to accomplish the task.
29
Those motivated to do harm seek software vulnerabilities
efectively errors in existing software code and create malware to exploit them,
subsequently compromising the integrity, availability and confdentiality of the ICT
networks and systems.
30
Some researchers hunt for these zero-day vulnerabilities
on behalf of governments, others on behalf of criminal syndicates, but many white
hat researchers constantly do the same job for little or no pay. To encourage
the white hat security community to efectively fnd holes in their commercial
26
U.S. Senate Committee on Armed Services, Statement of General Keith B. Alexander, Commander United
States Cyber Command, 27 March 2012.
27
U.S. Ofce of the National Counterintelligence Executive, Foreign Spies Stealing US Economic Secrets in
Cyberspace. Report to Congress on Foreign Economic Collection and Industrial Espionage, 2009-2011,
(Washington, DC: US Ofce of the National Counterintelligence Executive, 2011), http://www.ncix.gov/
publications/reports/fecie_all/Foreign_Economic_Collection_2011.pdf.
28
ICS-CERT, ICS-CERT Monthly Monitor, (Washington, DC: US Department of Homeland Security, 2012),
http://www.us-cert.gov/control_syssupratems/pdf/ICS-CERT_Monthly_Monitor_Apr2012.pdf.
29
Robert OHarrow, Cyber search engine Shodan exposes industrial control systems to new risks, The
Washington Post, 3 June 2012.
30
Hathaway, Leadership and Responsibility for Cybersecurity.
8 Cyber Terms and Defnitions
products before criminals or cyber warriors do, companies like Google, Facebook,
and Microsoft have programmes that pay for responsibly disclosed vulnerabilities.
31
The above examples illustrate that the internet and its associated global networks
have greatly increased the worlds dependence on ICT and thus also increased the
level of disruption that is possible when the infrastructure is under attack. And it is
constantly under attack, both by state and non-state actors. Although the problem
is obvious, the role of government vis--vis the private sector in the protection
of this critical infrastructure is often still unclear. This lack of clarity and vision
regarding government action is not totally unsurprising, however. To date, there
is not even a universal understanding on basic cyber terms and defnitions, so
common solutions will remain scarce.
1.2. CYBER TERMS AND DEFINITIONS
The internet, the ICT that underpin it and the networks that it connects are at times
also referred to as comprising cyberspace. Merriam-Webster defnes cyber as:
of, relating to, or involving computers or computer networks (as the Internet).
32
Cyberspace is more than the internet, including not only hardware, software and
information systems, but also people and social interaction within these networks.
The ITU uses the term to describe the systems and services connected either directly
to or indirectly to the internet, telecommunications and computer networks.
33
The International Organisation for Standardisation (ISO) uses a slightly diferent
term, defning cyber as the complex environment resulting from the interaction of
people, software and services on the internet by means of technology devices and
networks connected to it, which does not exist in any physical form.
34
Separately,
governments are defning what they mean by cyberspace in their national cyber
security strategies (NCSS). For example, in its 2009 strategy paper, the United
Kingdom refers to cyberspace as all forms of networked, digital activities; this
includes the content of and actions conducted through digital networks.
35
By
adding the phrase, the content of and actions conducted through, the government
31
Chris Rodriguez, Vulnerability Bounty Hunters, Frost & Sullivan, 3 February 2012.
32
Cyber, Merriam-Webster, http://www.merriam-webster.com/dictionary/cyber.
33
ITU, ITU National Cybersecurity Strategy Guide, (Geneva: ITU, 2011), http://www.itu.int/ITU-D/cyb/
cybersecurity/docs/ITUNationalCybersecurityStrategyGuide.pdf. 5.
34
ISO/IEC 27032:2012, Information technology Security techniques Guidelines for cybersecurity.
35
UK Cabinet Ofce, Cyber Security Strategy of the United Kingdom. Safety, security and resilience in
cyber space (Norwich: The Stationery Ofce, 2009). 7. However, in 2011 a new defnition of cyberspace
was put forward understood as an interactive domain made up of digital networks that is used to store,
modify and communicate information. It includes the internet, but also the other information systems
that support our businesses, infrastructure and services (see UK Cabinet Ofce, The UK Cyber Security
Strategy: Protecting and promoting the UK in a digital world (London: UK Cabinet Ofce, 2011).).
9 Preliminary Considerations: On National Cyber Security
can also address human behaviours that it fnds acceptable or objectionable. For
some nations, this includes consideration of internet censorship, online information
control, freedom of speech and expression, respect for property, protection of
individual privacy, and the protection from crime, espionage, terrorism, and
warfare. Governments, businesses, and citizens know intuitively that cyberspace is
man-made and an ever-expanding environment, and that therefore the defnitions
are also constantly changing.
1.2.1. Information, ICT, and Cyber Security
Most governments start their NCSS process by describing the importance of
securing information, implementing computer security or articulating the need
for information assurance. These terms are often used interchangeably, and
contain common core tenets of protecting and preserving the confdentiality,
integrity and availability of information. Information security focuses on
data regardless of the form the data may take: electronic, print or other forms.
Computer security usually seeks to ensure the availability and correct operation of
a computer system without concern for the information stored or processed by the
computer. Information assurance is a superset of information security, and deals
with the underlying principles of assessing what information should be protected.
Efectively, all three terms are often used interchangeably, even if they address
slightly diferent viewpoints. Most unauthorised actions that impact any of the core
tenets or information security attributes
36
are considered a crime in most nations.
The globalisation of the ICT marketplace and increasing reliance upon globally
sourced ICT products and services can expose systems and networks to exploitation
through counterfeit, malicious or untrustworthy ICT. And while not defned in
diplomatic fora, the term ICT security is often used to describe this concern.
In general, ICT security is more directly associated with the technical origins
of computer security, and is directly related to information security principles
including the confdentiality, integrity and availability of information resident on a
particular computer system.
37
ICT security, therefore, extends beyond devices that
are connected to the internet to include computer systems that are not connected
to any internet. At the same time, the use of the term ICT security usually excludes
all questions of illegal content, unless they directly damage the system in question,
and includes the term supply chain security.
36
The most basic attributes are Confdentiality, Integrity and Availability, and are known as the C-I-A
triad. Some systems expand this by including authenticity, reliability, or any number of other attributes
as well.
37
See, for instance, US DoC/NIST, Minimum Security Requirements for Federal Information and
Information Systems, (Gaithersburg, MD: NIST, 2006), http://csrc.nist.gov/publications/fps/fps200/
FIPS-200-fnal-march.pdf.
10 Cyber Terms and Defnitions
Figure 1: Relationship between Cyber Security and other Security Domains
38
38
This Figure has been adopted from ISO/IEC 27032:2012, Information technology Security
techniques Guidelines for cybersecurity. It slightly difers from the original in that it contains ICT
Security* instead of Application Security. The latter has been defned as a process to apply controls
and measurements to an organizations applications in order to manage the risk of using them. Controls
and measurements may be applied to the application itself (its processes, components, software and
results), to its data (confguration data, user data, organization data), and to all technology processes
and actors involved in the applications life circle (ibid., 10.). Information Security is concerned
with the protection of confdentiality, integrity, and availability of information in general, to serve
the needs of the applicable information user (ibid.). Network Security is concerned with the design,
implementation, and operation of networks for achieving the purposes of information security on
networks within organizations, between organizations, and between organizations and users (ibid.).
Internet Security is concerned with protecting internet-related services and related ICT systems and
networks as an extension of network security in organizations and at home, to achieve the purpose of
security. Internet Security also ensures the availability and reliability of Internet services (ibid., 11.).
CIIP is concerned with protecting the systems that are provided or operated by critical infrastructure
providers, such as energy, telecommunication, and water departments. CIIP ensures that those systems
and networks are protected and resilient against information security risks, network security risks,
internet security risks, as well as Cybersecurity risks (ibid.). Cybercrime has been defned as the
criminal activity where services or applications in the Cyberspace are used for or are the target of a
crime, or where the Cyberspace is the source, tool, target, or place of a crime (ibid., 4.). Cybersafety has
been defned as the condition of being protected against physical, social, spiritual, fnancial, political,
emotional, occupational, psychological, educational or other types or consequences of failure, damage
error, accidents, harm or any other event in the Cyberspace which could be considered non-desirable
(ibid.). Cybersecurity, or Cyberspace Security has been defned as the preservation of confdentiality,
integrity and availability of information in the Cyberspace (ibid.). However, it has also been noted that
[i]n addition, other properties such as authenticity, accountability, non-repudiation and reliability can
also be involved (ibid.) in cyber security.
11 Preliminary Considerations: On National Cyber Security
The United States, India, Russia and many other countries are increasingly voicing
concerns that the introduction of counterfeit, malicious or untrustworthy ICT could
disrupt the performance of sensitive national security systems, and compromise
essential government services. The ICT supply chain consists of many phases,
including design, manufacture, integrate, distribute, install and operate, maintain
and decommission. The processes by which nations consider the security of their
ICT supply chain should try to address each phase of the lifecycle. Protection
measures must be developed across the product lifecycle and be reinforced through
both acquisition processes and efective implementation of government/enterprise
security practices. For example, the highest risk factors in the supply chain are
after build (e.g., during the install and operate and retire phases) because this
is where multiple vendors participate in the process (e.g., integrate products with
other systems, patch/update, etc.) and there are few measures to monitor and assure
integrity throughout the entire process. This is a problem for all countries: the
evolution of the ICT industry means that many countries and global corporations
now play a role in the ICT supply chain, and no country can source all components
from totally trusted providers. This trust is needed, however, as the promise of
ICT-driven economic growth is dependent upon the core infrastructure being both
secure and resilient.
There is no agreed defnition of internet security. Within a technical context,
internet security is concerned with protecting internet-related services and related
ICT systems and networks as an extension of network security in organizations
and at home, to achieve the purpose of security. Internet security also ensures
the availability and reliability of internet services.
39
However, in a political
context, internet security is often equated with what is also known as internet
safety. In general, internet safety refers to legal internet content. While this has
sometimes been linked to government censorship in autocratic governments,
restrictions on internet content are, in fact, common. Besides issues surrounding
the exploitation of children, internet censorship can also include issues such as
intellectual property rights as well as the prosecution of political or religious views.
What internet security probably does not include is non-internet relevant technical
issues, including those that address the various internets which are not connected
to the world wide web. These, however, are covered by the term network security.
Network security is particularly important for critical infrastructures that are often
not directly connected to the internet. Consequently, for some, internet security
implies a global government regime to deal with the stability of the internet code
and hardware, as well as the agreements on the prosecution of illegal content.
39
ISO/IEC 27032:2012, Information technology Security techniques Guidelines for cybersecurity, 11.
12 Cyber Terms and Defnitions
The term cyber security was widely adopted during the year 2000 with the
clean-up of the millennium software bug.
40
When the term cyber security is
used, it usually extends beyond information security and ICT security. ISO defned
cyber security as the preservation of confdentiality, integrity and availability of
information in the Cyberspace.
41
The Netherlands defned cyber security more
broadly, to mean freedom from danger or damage due to the disruption, breakdown,
or misuse of ICT. The danger or damage resulting from disruption, breakdown or
misuse may consist of limitations to the availability or reliability of ICT, breaches of
the confdentiality of information stored on ICT media, or damage to the integrity
of that information.
42
The ITU also defned cyber security broadly as:
[T]he collection of tools, policies, security concepts, security safeguards,
guidelines, risk management approaches, actions, training, best practices,
assurance and technologies that can be used to protect the cyber environment
and organization and users assets. Organization and users assets include
connected computing devices, personnel, infrastructure, applications, services,
telecommunications systems, and the totality of transmitted and/or stored
information in the cyber environment. Cybersecurity strives to ensure the
attainment and maintenance of the security properties of the organization
and users assets against relevant security risks in the cyber environment. The
general security objectives comprise the following: availability; integrity, which
may include authenticity and non-repudiation; and confdentiality.
43
Many countries are defning what they mean by cyber security in their respective
national strategy documents. As of the publication of this Manual, more than 50
nations have published some form of a cyber strategy defning what security means
to their future national and economic security initiatives.
When the term defence is paired with cyber it usually is within a military context,
but also may take into account criminal or espionage considerations. For example,
the North Atlantic Treaty Organisation (NATO) uses at least two terms when it
comes to cyber defence and information security. The frst addresses a broader
information security environment: communications and information systems
44
40
The millennium bug was a problem for both digital (computer-related) and non-digital documentation
and data storage situations which resulted from the practice of abbreviating a four-digit year to two
digits.
41
ISO/IEC 27032:2012, Information technology Security techniques Guidelines for cybersecurity.
42
Dutch Ministry of Security and Justice, The National Cyber Security Strategy (NCSS). Strength through
Cooperation, (The Hague: National Coordinator for Counterterrorism and Security, 2011), 4.
43
Recommendation ITU-T X.1205 (04/2008), Section 3.2.5.
44
CIS security is defned as: The ability to adequately protect the confdentiality, integrity, and availability
of Communication and Information Systems (CIS) and the information processed, stored or transmitted.
13 Preliminary Considerations: On National Cyber Security
(CIS) security, where security is defned as the ability to adequately protect the
confdentiality, integrity and availability of CIS and the information processed,
stored or transmitted.
45
NATO uses a diferent defnition for the term cyber
defence: the ability to safeguard the delivery and management of services in an
operational CIS in response to potential and imminent as well as actual malicious
actions that originate in cyberspace.
46
The United States military defnes it in
two contexts as well. The frst, from the Joint Staf, defnes computer network
defence (CND) as: actions taken to protect, monitor, analyze, detect, and respond
to unauthorized activity within the Department of Defense information systems
and computer networks.
47
Finally, the newly formed United States Cyber Command
operationalised the term and defnes defensive cyber operations as: direct and
synchronize actions to detect, analyse, counter and mitigate cyber threats and
vulnerabilities; to outmanoeuvre adversaries taking or about to take ofensive
actions; and to otherwise protect critical missions that enable US freedom of action
in cyberspace.
48
The common theme from all of these varying defnitions, however, is that cyber
security is fundamental to both protecting government secrets and enabling
national defence, in addition to protecting the critical infrastructures that permeate
and drive the 21
st
century global economy. The slight diferentiation in defnition
between governments and intergovernment organisations is irrelevant, as their
shared focus on the issues illustrates the frst step in the long journey to actually
providing for cyber security no matter what the defnition.
1.2.2. Cyber Crime
There does not appear to be a common view regarding what constitutes illegal or
illicit activity on the internet. Yet most would agree that one of the fastest-growing
areas of crime is that which is taking place in cyberspace.
49
Eforts to clarify and
address this issue began in the United Nations (UN) in 1990, where the General
Assembly (UN GA) debated and adopted a resolution dealing with computer crime
legislation which was later expanded in 2000 and again in 2002 to combat the
45
Geir Hallingstad and Luc Dandurand, Cyber Defence Capability Framework Revision 2. Reference
Document RD-3060 (The Hague: NATO C3 Agency, 2010).
46
Ibid.
47
US Joint Chiefs of Staf, Joint Publication 6-0. Joint Communications System, (Ft. Belvoir, VA: DTIC,
2010), http://www.dtic.mil/doctrine/new_pubs/jp6_0.pdf.
48
GAO, Defense Department Cyber Eforts. More Detailed Guidance Needed to Ensure Military Services
Develop Appropriate Cyberspace Capabilities, (Washington, DC: GAO, 2011), http://www.gao.gov/
products/GAO-11-421. 5.
49
Europol, Threat Assessment (Abridged). Internet Facilitated Organised Crime (iOCTA), (The Hague:
Europol, 2011), https://www.europol.europa.eu/sites/default/fles/publications/iocta.pdf.
14 Cyber Terms and Defnitions
criminal misuse of ICT.
50
As a result, these early discussions encouraged countries
to update their penal codes. For example, in 1997, the Russian government updated
the Russian Penal Code (Chapter 28) to address cyber crime, IT crime, and cyber
terrorism. Penalties were identifed for, among other things, illegal access to the
information on a computer, computer systems and networks; creation, spreading
and usage of harmful software and malware; violation of operation instructions
of a computer, computer systems and networks; illegal circulation of objects of
intellectual property; illegal circulation of radio-electronic and special high-tech
devices; and manufacturing and spreading of child pornography.
Also in 1997, the felonies of illegal intrusion into a computer information system
and causing damage to a computer information system were specifcally added to
the Criminal Law of the Peoples Republic of China. In June 2010, the Information
Ofce of the State Council published a white paper on the internet in China. It detailed
Chinas principles for the internet and identifed particular activities that were
objectionable to the state. For example, it stated: the security of telecommunications
networks and information shall be protected by law. No organization or individual
may utilise telecommunication networks to engage in activities that jeopardise
state security, the public interest or the legitimate rights and interests of other
people.
51
In addition to China and Russia, many other countries also have updated
their legal frameworks to address criminal activities in accordance with the spirit
of the discussion that began nearly 25 years ago.
The Council of Europe (CoE) also adopted a Convention on Cybercrime in July 2004,
52
the frst international convention to address this issue. It contains a relatively high
standard of international cooperation for investigating and prosecuting cyber crime.
It recognised that criminals exploit the seams of cross-jurisdictional cooperation
and coordination among nations. The treaty defned key terms such as computer
system, computer data, trafc data, and service provider in an efort to create
commonality among signatories existing statutes, but does not defne the key term
cybercrime. The treaty went on to highlight actions that nations must undertake
to prevent, investigate and prosecute, including copyright infringement, computer-
related fraud, child pornography and violations of network security. For example, it
outlined ofences against the confdentiality, integrity and availability of computer
data and systems (e.g., illegal access, illegal interception, data interference, system
interference, misuse of devices). It also discussed computer-related fraud and
forgery. The treaty also contained a series of powers and procedures, such as the
50
Marco Gercke, Regional and International Trends in Information Society Issues, in HIPCAR Working
Group 1 (St. Lucia: ITU, 2010).
51
Chinese Information Ofce of the State Council, The Internet in China (White Paper) (Beijing:
Government of the Peoples Republic of China, 2010).
52
Council of Europe, Convention on Cybercrime (ETS No. 185) (Budapest: Council of Europe, 2001).
15 Preliminary Considerations: On National Cyber Security
search of computer networks and interception. Over ten years after the treaty
was formed, it has been signed by 47 states, and has been ratifed by 37.
53, 54
This
is controversial in some nations, and might explain the relatively small number
of countries that have managed to approve the treaty in accordance with their
domestic constitutional requirements and thereby making it enforceable.
Other organisations have taken similar approaches, within their own frameworks.
In July 2006, the ASEAN Regional Forum (ARF) issued a statement that its
members should implement cyber crime and cyber security laws in accordance
with their national conditions and should collaborate in addressing criminal
and terrorist misuse of the Internet.
55
These commitments were later codifed
in the 2009 agreement within the Shanghai Cooperation Organization (ASEAN-
China Framework Agreement) on information security. Additionally, it is the only
international treaty that addresses concerns of a wider concept of information
war, which the treaty defned as confrontation between two or more states
in the information space aimed at damaging information systems, processes
and resources, and undermining political, economic and social systems, mass
brainwashing to destabilise society and state, as well as forcing the state to take
decisions in the interest of an opposing party.
56
Illicit and illegal activity defnitions difer from region to region. Online fraud, online
theft and other forms of cyber crimes which misappropriate the property of others
are on the rise. It is inexpensive to develop and use malware, as was observed in
2011 with the 400 million unique variants and as many as eight new zero-day
vulnerabilities were exploited per day.
57
As citizens adopt and embed more mobile
devices into their business and personal lives, it is likely that malware authors will
create mobile specifc malware geared toward the unique opportunities that the
mobile environment presents for abuse of electronic transactions and payments.
Nations around the world have identifed cyber crime (however it is defned) as
a national priority. They also recognise that jurisdiction for prosecuting cyber
crime stops at national borders, which underscores the need for cooperation and
coordination through regional organisations like ASEAN and the Council of Europe.
53
Brian Harley, A Global Convention on Cybercrime?, Science and Technology Law Review, 23 March
2010.
54
Council of Europe, Convention on Cybercrime (Treaty Status), http://conventions.coe.int/Treaty/
Commun/ChercheSig.asp?NT=185&CM=8&DF=&CL=ENG.
55
Greg Austin, Chinas Cybersecurity and Pre-emptive Cyber War, NewEurope, 14 March 2011.
56
See Shanghai Cooperation Organization, Agreement on Cooperation in the Field of Ensuring
International Information Security [based on unofcial translation] (Yekaterinburg: Shanghai
Cooperation Organization, 2009). Annex I; Nils Melzer, Cyber operations and jus in bello, Disarmament
Forum, no. 4 (2011).
57
Symantec Corporation, Internet Security Threat Report: 2011 Trends. See also Hathaway, Falling Prey
to Cybercrime: Implications for Business and the Economy.
16 Cyber Terms and Defnitions
1.2.3. Cyber Espionage
Cyberspace provides an exceptional environment for espionage because it provides
foreign collectors with relative anonymity, facilitates the transfer of a vast amount
of information, and makes it more difcult for victims and governments to assign
blame by masking geographic locations.
58
While some nations defne these
intrusions or unauthorised access to data or an automated information system as
an attack, most of the observed activity today does not qualify as an attack under
international law. It is considered to be theft of commercial intellectual property
and proprietary information, of data with signifcant economic value, or the theft
of government sensitive and classifed information. These given considerations are
defned by almost all nations as criminal acts frst, and espionage second. This
is also a simple necessity: with the rise of presumed state-sponsored industrial
espionage, it is very often unclear if an activity that for certain can be categorised
as cyber crime should instead be described as cyber espionage.
Espionage is defned as, the practice of spying or using spies to obtain information
about the plans and activities especially of a foreign government or a competing
company.
59
In this context, espionage is when foreign governments or criminal
networks steal information or counterfeit goods in ways that erode the publics
trust in internet services. It is pervasive throughout the world, the number of
businesses falling victim to these crimes increases daily and no sector is without
compromise. Companies and governments regularly face attempts by others
to gain unauthorised access through the internet to their data and information
technology systems by, for example, masquerading as authorised users or through
the surreptitious introduction of malicious software.
60
Some defne this activity
as Computer Network Exploitation (CNE): enabling operations and intelligence
collection capabilities through the use of computer networks to gather data from
target or adversary automated information systems or networks.
61
It is important to
note that CNE is often an enabling prerequisite for disruptive or damaging activities
on an information system (see below).
However it is defned, cyber espionage, particularly when targeting commercial
intellectual property, risks, over time, undermining a national economy. Many
countries use espionage to spur rapid economic growth based on advanced
technology, targeting science and technology initiatives of other nations. Because
58
US Ofce of the National Counterintelligence Executive, Foreign Spies Stealing US Economic Secrets in
Cyberspace. Report to Congress on Foreign Economic Collection and Industrial Espionage, 2009-2011.
59
Espionage, Merriam-Webster, http://www.merriam-webster.com/dictionary/espionage.
60
See Hathaway, Falling Prey to Cybercrime: Implications for Business and the Economy.
61
U.S. Joint Chiefs of Staf, Joint Publication 3-13. Information Operations, (Ft. Belvoir, VA: DTIC, 2006),
http://www.dtic.mil/doctrine/new_pubs/jp3_13.pdf.
17 Preliminary Considerations: On National Cyber Security
ICT forms the backbone of nearly every other technology used in both civilian and
military applications today, it has become one of the primary espionage targets.
Of course, military and civilian dual-use technologies will remain of interest to
foreign collectors, especially advanced manufacturing technologies that can boost
industrial competitiveness.
1.2.4. Cyber Warfare
The term cyber warfare is both ambiguous and controversial there is no ofcial
or generally accepted defnition. While the term itself is virtually never used in
ofcial documents, its relatives Information Operations (Info Ops or also IO) and
Information Warfare (IW) are commonly used, albeit with diferent meanings.
More than 30 countries have an articulated doctrine and have announced dedicated
ofensive cyber warfare programmes, mostly using IO or IW as terminology.
62
Nonetheless, the term cyber war has a useful academic purpose, in terms that
it concentrates thinking on state to state confict within and through cyberspace,
and the ramifcations this can have. Accordingly, cyber warfare has become an
unavoidable element in any discussion of international security. For example,
Russia discusses information warfare methods as a means to attack an adversarys
centres of gravity and critical vulnerabilities, and goes on to state that by doing so,
it is possible to win against an opponent, militarily as well as politically, at a low
cost without necessarily occupying the territory of the enemy.
63, 64
This doctrine
is a synthesis of the ofcial position of state policy for maintaining information
security. Likewise, China also discusses information warfare in depth, and the need
to conduct ofensive operations exploiting the vulnerabilities and dependence of
nations on ICT and the internet in a recently published book.
65
China continues
62
Lewis and Timlin, Cybersecurity and Cyberwarfare. Preliminary Assessment of National Doctrine and
Organization.
63
Roland Heicker, Emerging Cyber Threats and Russian Views on Information Warfare and Information
Operations, (Stockholm: Swedish Defence Research Agency 2010), http://www.highseclabs.com/
Corporate/foir2970.pdf. 18.
64
Alexander Klimburg and Heli Tirmaa-Klaar, Cybersecurity and Cyberpower: Concepts, Conditions and
Capabilities for Cooperation for Action within the EU, (Brussels: European Parliament, 2011), http://
www.oiip.ac.at/fleadmin/Unterlagen/Dateien/Publikationen/EP_Study_FINAL.pdf.
65
For a recent non-state Chinese account see Hunan Peoples Publishing House, China Cyber Warfare: We
Cant Lose the Cyber War (Hunan: China South Publishing & Media Group).
18 Cyber Terms and Defnitions
to evolve its military strategy and doctrine for conducting information warfare
campaigns and taking advantage of the informationisation
66
of society.
Of course when nations begin to discuss cyber warfare, they need to clarify what
they mean by cyber attack.
67
Germany defnes a cyber attack as an IT attack in
cyberspace directed against one or several other IT systems and aimed at damaging
IT security confdentiality, integrity and availability which may all or individually
be compromised.
68
The United Kingdom outlined four diferent methods of cyber
attack in its national cyber strategy: electronic attack, subversion of supply chain,
manipulation of radio spectrum, disruption of unprotected electronics using high
power radio frequency.
69
The United States defnes Computer Network Attack (CNA)
as actions taken through the use of computer networks to disrupt, deny, degrade,
or destroy information resident in computers and computer networks, or the
computers and networks themselves.
70
The diference between the US and German
defnition of cyber attack is an illustrative one: the US defnition does not include
attacks on confdentiality (e.g., through a probe or espionage) as a cyber attack
while, according to the German defnition, there is no diference between a probe
and a cyber attack. The term takes on diferent meanings to meet the security remit
of diferent communities. For example, it is natural for the military to be ambiguous
as to whether an attack is considered a use of force (as defned by the Law of Armed
Confict), whereas the law enforcement community (police and prosecutors) are
more likely to describe an attack as a crime. Incident response professional and
technical experts will likely use the term to generically characterise any malicious
attempt against confdentiality or availability. A single defnition will not help this,
but clarity about which meaning of attack is meant in a particular context can help
reduce confusion.
In general, there is agreement that cyber activities can be a legitimate military
activity, but there is no global agreement on the rules that should apply to it. This
is further complicated by the ambiguous relationship between cyber war and cyber
66
China has is promoting informationisation development for economic restructuring, infrastructure
modernisation, and national security. It is similar to the Digital Agenda of Europe, in that it is promoting
all the means to accelerate the process from the industry society to the information society. It contains
seven areas of emphasis: (1) ICT and ICT industries (manufacture, service); (2) ICT applications (e-gov,
e-commerce); (3) Information Resources (Content); (4) Information Infrastructure (Network); (5)
Information Security; (6) Talents (all kinds); (7) Laws, Regulations, Standards, and Specifcations (see
Xiaofan Zhao, Practice and Strategy of Informatization in China, (Shanghai: UPAN, 2006).).
67
See Section 3.1.3 for a more detailed examination of cyber attack classifcations.
68
German Federal Ministry of the Interior, Cyber Security Strategy for Germany (Berlin: Beauftragter der
Bundesregierung fr Informationstechnik, 2011). 14-5.
69
UK Cabinet Ofce, The UK Cyber Security Strategy: Protecting and promoting the UK in a digital world:
13-4.
70
U.S. Joint Chiefs of Staf, Joint Publication 3-13. Information Operations.
19 Preliminary Considerations: On National Cyber Security
espionage there is a very fne line between breaking into a computer to spy and
breaking in to attack.
71
Nations are concerned that infrastructure disruption could
infict signifcant economic costs on the public and private sectors and impair
performance of essential services. This is why some nations are demanding a
dialogue regarding what constitutes a legitimate target in cyberspace, code of
conduct for stewardship and confict, and the need for confdence building measures
to reduce the risk of unwanted or unnecessary miscalculation and subsequent
escalation of confict and misunderstanding.
For example, China, Russia, Tajikistan and Uzbekistan introduced an International
Code of Conduct for Information Security for consideration by the 66
th
UN General
Assembly.
72
This document was intended to jumpstart discussion on wide-ranging
approaches for dealing with appropriate behaviours in cyberspace. This specifc
proposal and the overall concept of a code of conduct, will likely be raised at a
number of upcoming international fora dealing with cyber security and internet
policy matters.
To date, it appears that the United States and a number of European countries
oppose the notion that a code of conduct or treaty is needed to address cyber
warfare. They argue that the proposed obligations seem to be in confict with
existing international law built around concepts such as refraining from the threat
or use of force (Article 2(4) of the UN Charter) and the right to exercise self-defence
if an armed attack occurs (Article 51 of the UN Charter). Moreover, it is unclear how
a proposed codes concepts of hostile activities and threats to international peace
and security relate to the threat or use of force standard in Article 2(4), or whether
the proposed code would constrain the inherent right to self-defence recognised
in Article 51. Other nations are taking the initiative to drive debate and resolution
regarding what is needed, given the economic and national security consequences
of what is at stake. These eforts have taken on a new tempo and seriousness given
the use of Stuxnet against Irans nuclear infrastructure. For example, the United
Kingdom hosted a conference on norms of behaviour in London in 2011 to help
foster an international dialogue, and it is expected that this discussion will continue
in Hungary and South Korea in the coming years.
71
James Lewis, Confdence-building and international agreement in cybersecurity, Disarmament Forum,
no. 4 (2011): 56.
72
See UNGA, Letter dated 12 September 2011 from the Permanent Representatives of China, the Russian
Federation, Tajikistan and Uzbekistan to the United Nations addressed to the Secretary-General
(A/66/359) (New York: United Nations, 2011).
20 National Cyber Security
1.3. NATIONAL CYBER SECURITY
There is no universally accepted explicit defnition of what constitutes national
cyber security (or NCS for short). Indeed, although the exact term is hardly ever
used in ofcial strategies, it is commonly employed by government spokespersons
without ever being defned. NCS has two obvious roots: the term cyber security and
the term national security both of which are often diferently defned in ofcial
national documents. Even if the term national cyber security is seldom explicitly
defned, it is possible to derive a working defnition based on the respective use of
the other two terms.
1.3.1. Comparison of National and Cyber Security
When analysing the use of the terms cyber security and national security
in ofcial documents, it is frst and foremost necessary to accept that national
diferences (to say nothing of linguistic diferences) will often prevent a direct and
literal comparison. As discussed above, the term cyber security does not have
a single accepted common defnition, and this is especially the case when used
within public policy documents. Also, the term national security is not always
defned even within a specifc national context an often intentional move aimed to
provide government with needed fexibility.
73
Until relatively recently, the term national security was largely used only within
the United States. The widespread introduction of dedicated national security
strategies (NSS) in a number of OECD countries is a relatively recent phenomenon
that appears to have been closely tied to a shift in strategic thought away from
focusing on a few specifc threats to the idea against of mitigation against myriad
risks. Thus, for example, in nearly all of the post-2007 strategies, cyber security is
defned as a key national security issue. Indeed, in some cases, the topic of cyber
security (or even national cyber security) predates the actual creation of the
national security strategy, and sometimes even seems to function as a driver for the
paradigm shift to a more comprehensive national security strategy; one in which
the state not only recognises that various risks need to be addressed, but that they
only can be addressed by working together with non-state actors.
73
For example, the UK Security Service (also known as MI5) states that: The term national security is
not specifcally defned by UK or European law. It has been the policy of successive Governments and
the practice of Parliament not to defne the term, in order to retain the fexibility necessary to ensure
that the use of the term can adapt to changing circumstances (UK Security Service (MI5), Protecting
National Security, https://www.mi5.gov.uk/home/about-us/what-we-do/protecting-national-security.
html.).
21 Preliminary Considerations: On National Cyber Security
When looking at specifc countries, this paradigm shift becomes fairly clear. Australia,
for instance, published its First National Security Statement to its Parliament in
2008,
74
which was put in place as part of a long-term reform agenda to establish a
sustainable national security policy framework. When the Australian government
released its Cyber Security Strategy
75
in 2009, it was clear that the strategy dealt with
both Australias national security and its digital economy. While the National Security
Strategy highlights the vitality of partnerships between industry, governments and
the community,
76
in order to maintain a secure, resilient and trusted electronic
operating environment,
77
the governments cyber security policy has a similar
emphasis on partnerships with the private sector; while simultaneously referring to
the fact that the Australian Government has an important leadership role.
78
Although the term national security has been used in Canada since the 1970s, the
frst ofcial incorporation of a national security strategy did not occur until 2004.
79
However, as set out in its National Security Strategy, threats that undermine the
security of the state of society [...] generally require a national response, as they are
beyond the capacity of individuals, communities or provinces to address alone.
80
In
context with Canadas cyber security strategy, this implies a shared responsibility,
one in which Canadians, their governments, the private sector and our international
partners all have a role to play.
81
In Germany, at least until 2008, the term Sicherheitspolitik was considered to be
sufciently analogous to the English term national security. But in recent years
the term national security has taken root in German policy and political discourse,
perhaps in an efort to draw attention to the increased blurring of national and
international risks (as opposed to the threat-based model of the Cold War) requiring
an increased national cooperation. As part of these eforts, the term cyber security
might be considered directly analogous to national cyber security, in that it is also
directly tied with a single specifc programme the national protection plan for the
critical information infrastructure.
82
74
Australian Prime Minister, The First National Security Statement to the Australian Parliament
(Canberra: Australian Government, 2008).
75
Australian Attorney-Generals Department, Cyber Security Strategy (Canberra: Australian Government,
2009).
76
Ibid., 5.
77
Ibid.
78
Ibid.
79
Canadian Privy Council Ofce, Securing an Open Society: Canadas National Security Policy (Ottawa:
Canadian Government, 2004).
80
Ibid., vii.
81
Canadian Department for Public Safety, Canadas Cyber Security Strategy. For a Stronger and More
Prosperous Canada (Ottawa: Canadian Government, 2010). 17.
82
The implementation of this protection plan is known as UP-KRITIS (civilian) and UP-BUND (for
government).
22 National Cyber Security
Similarly, in France there was no formal tradition of the term national security
until 2008, when it was frst introduced in the Defence White Book.
83
In contrast
to Germany, the concept of national security was comprehensively defned, based
upon both defence (military) and domestic (internal) civilian strategies, together
with an overall set of guiding principles.
84
Recent French government documents
85
make it clear that cyber defence aims to protect the security of Frances critical
information systems according to information assurance measures.
The frst British National Security Strategy was introduced in 2008 and has been
reviewed at least two times since. The rationale for moving away from the previous
emphasis on Strategic Defence Reviews or Defence White Papers was made quite
clear:
The aim of this frst National Security Strategy is to set out how we will address
and manage this diverse though interconnected set of security challenges and
underlying drivers, both immediately and in the longer term, to safeguard the
nation, its citizens, our prosperity and our way of life.
86
The focus on this diverse set of security challenges was particularly directed at
cyber security. To enjoy freedom and prosperity in cyberspace, the government
set out four guiding objectives: successful handling of cyber crime; establishing
the UK as one of the most secure places in the world to do business; improvement
of resilience to cyber attacks, and protection of national interests in cyberspace.
87
The British National Cyber Strategy is a comprehensive document that goes beyond
national security issues. Although the national security component of the Cyber
Security Strategy remains partially classifed, it appears to be well funded in that
over 650 million was made available for the period 2011-2015. Interestingly, the
defnition of cyber security seems equally concerned with protecting systems as
well as exploiting opportunities and encompasses missions as diverse as internet
governance, trade policy, counter-terrorism and intelligence.
83
French White Paper Commission, The French White Paper on Defence and National Security (Paris:
Odile Jacob, 2008).
84
The republican compact that binds all French people to the State, namely the principles of democracy,
and in particular individual and collective freedoms, respect for human dignity, solidarity and justice
(ibid., 58.).
85
French Secretariat-General for National Defence and Security, Information systems defence and
security. Frances strategy (Paris: French Network and Information Security Agency, 2011).
86
UK Cabinet Ofce, The National Security Strategy of the United Kingdom. Security in an interdependent
world (Norwich: The Stationery Ofce, 2008).
87
UK Cabinet Ofce, The UK Cyber Security Strategy: Protecting and promoting the UK in a digital world:
21.
Table 3: National (Cyber) Security Strategies in Selected OECD Countries
Australia
88
Australia2
89
Canada
90
Canada2
91
Federal
92
German
93
French
94
French2
95
Dutch
96
Dutch2
97
UK
98
UK2
99
White house
100
White
House2
101
National
102
Public
103
88
Australian Prime Minister, The First National Security Statement to the Australian Parliament.
89
Australian Attorney-Generals Department, Cyber Security Strategy.
90
Canadian Privy Council Ofce, Securing an Open Society: Canadas National Security Policy.
91
Canadian Department for Public Safety, Canadas Cyber Security Strategy. For a Stronger and More Prosperous Canada.
92
Federal Ministry of Defence, White Paper 2006 on German Security Policy and the Future of the Bundeswehr (Berlin: Federal Ministry of
Defence, 2006).
93
German Federal Ministry of the Interior, Cyber Security Strategy for Germany.
94
French White Paper Commission, The French White Paper on Defence and National Security.
95
French Secretariat-General for National Defence and Security, Information systems defence and security. Frances strategy.
96
Dutch Government, Strategie Nationale Veiligheid (The Hague: Ministry of the Interior and Kingdom Relations, 2007).
97
Dutch Ministry of Security and Justice, The National Cyber Security Strategy (NCSS). Strength through Cooperation.
98
UK Cabinet Ofce, The National Security Strategy: A Strong Britain in an Age of Uncertainty (Norwich: The Stationary Ofce, 2010).
99
UK Cabinet Ofce, The UK Cyber Security Strategy: Protecting and promoting the UK in a digital world.
100
White House, National Security Strategy (Washington, DC: White House, 2010).
101
White House, The National Strategy to Secure Cyberspace.
102
National Security Presidential Directive 54: Cyber Security and Monitoring (NSPD-54) / Homeland Security Presidential Directive 23: Cyber
Security and Monitoring (HSPD-23).
103
Public Safety and Homeland Security Bureau, Tech Topic 20: Cyber Security and Communications, FCC, http://transition.fcc.gov/pshs/
techtopics/techtopics20.html.