1st Edition

Routledge Companion to Global Cyber-Security Strategy

Edited By Scott N. Romaniuk, Mary Manjikian Copyright 2021
    656 Pages 18 B/W Illustrations
    by Routledge

    656 Pages 18 B/W Illustrations
    by Routledge

    This companion provides the most comprehensive and up-to-date comparative overview of the cyber-security strategies and doctrines of the major states and actors in Europe, North America, South America, Africa, and Asia.

    The volume offers an introduction to each nation’s cyber-security strategy and policy, along with a list of resources in English that may be consulted for those wishing to go into greater depth. Each chapter is written by a leading academic or policy specialist, and contains the following sections:

    • overview of national cyber-security strategy;
    • concepts and definitions;
    • exploration of cyber-security issues as they relate to international law and governance;
    • critical examinations of cyber partners at home and abroad;
    • legislative developments and processes;
    • dimensions of cybercrime and cyberterrorism;
    • implications of cyber-security policies and strategies.

    This book will be of much interest to students and practitioners in the fields of cyber-security, national security, strategic studies, foreign policy, and international relations.

    Foreword: Global cybersecurity in the 21st century

    Introduction: cybersecurity strategy and policy in a comparative context (Mary Manjikian and Scott N. Romaniuk)

    Part I: Europe

    1 Securing the kingdom’s cyberspace: cybersecurity and cyber intelligence in Spain (Rubén Arcos)

    2 Albania’s cybersecurity pivot: between western architectures and great power competition (Alexander Fotescu and Mihai Chihaia)

    3 Armenian national policy in cyber space: toward a global cyber security architecture (Ruben Elamiryan)

    4 Czech Republic: a new cyber security leader in Central Europe (Lucie Kadlecová and Michaela Semecká)

    5 Cybersecurity in the French Republic (Amber Darwish and Scott N. Romaniuk)

    6 Germany’s cybersecurity strategy: confronting future challenges (Scott N. Romaniuk and Michael Claus)

    7 Cybersecurity of Poland: legal and organizational framework (Dominika Dziwisz)

    8 Hungary: from the groundworks to an evolving cyber security landscape (Annamaria Beláz and Dániel Berzsenyi)

    9 Romanian cybersecurity efforts: a work in progress (Oana-Elena Brânda)

    10 Italy’s cybersecurity architecture and critical infrastructure (Tommaso De Zan, Giampiero Giacomello, and Luigi Martino)

    11 Dutch cyber security strategy (Joost Bunk and Max Smeets)

    12 Norwegian cybersecurity: a small-state approach to building international cyber cooperation (Lars Gjesvik)

    13 Seeking a new order for global cybersecurity: the Russian approach to cyber-sovereignty (Ilona Stadnik)

    14 Slovakia: the Tatra Tiger without teeth (Aaron T. Walter)

    15 Slovenia: a fragmented cyber security (Laris Gaiser)

    16 In the line of Russian aggression: Ukraine, hybrid warfare, and cyber security defense (Olya Zaporozhets and Oleksiy Syvak)

    17 United Kingdom: pragmatism and adaptability in the cyber realm (Tim Stevens)

    18 European Union: policy, cohesion, and supranational experienceswith cybersecurity (Christopher Whyte)

    19 Estonia: from the "Bronze Night" to cybersecurity pioneers (Nick Robinson and Alex Hardy)

    20 NATO’s evolving cyber security policy and strategy (Scott N. Romaniuk, Alexander Fotescu, and Mihai Chihaia)

    Part II: Asia and Australia

    21 Japan’s challenges, capabilities, and preparedness in cyberspace (Tobias Burgers, Scott N. Romaniuk, and Cherry H. Y. Wong)

    22 An effective shield? Analyzing South Korea’s cybersecurity strategy (Yangmo Ku)

    23 In the line of fire: Taiwan’s legal, political, and technological cybersecurity posture (Tobias Burgers, Moritz Hellmann and Scott N. Romaniuk)

    24 Serving the people: China’s cybersecurity policy and its implications (Yu-Cheng Chen, Tony Tai-Ting Liu, and Scott N. Romaniuk)

    25 Cybersecurity in a one-party state: policies and implications for Vietnam’s economy and online freedom (Phan Le)

    26 The Philippines’ cybersecurity strategy: strengthening partnerships to enhance cybersecurity capability (Amparo Pamela, H. Fabe, and Ella Zarcilla-Genecela)

    27 Malaysia: balancing national development, national security, and cybersecurity policy (Ahmad El-Muhammady)

    28 Cyber governance and data protection in India: a critical legal analysis (Debarati Halder and K. Jaishankar)

    29 Cyber security: a national priority for Bangladesh (Md. Shariful Islam)

    30 Managing a digital revolution: cyber security capacity building in Myanmar (Niels Nagelhus Schia and Lars Gjesvik)

    31 Australia’s cyber security: a unique opportunity (Ana Stuparu)

    32 Singapore: a leading actor in ASEAN cybersecurity (Benjamin Ang)

    Part III: The middle east

    33 Between multi-stakeholderism and cyber sovereignty: uunderstanding Turkey’s cybersecurity strategy (Tuba Eldem)

    34 Israel: cyber securitization as national trademark (Fabio Cristiano)

    35 Palestinian territory occupied: cybersecurity at reduced sovereignty (Fabio Cristiano)

    36 The "Silicon Valley of the Middle East": cybersecurity, Saudi Arabia, and the path to vision 2030 (Anwar Ouassini and Kimeu W. Boynton)

    37 The Islamic Republic of Iran’s cybersecurity strategy: challenges in an era of cyber uncertainty (Filiz Katman)

    Part IV: The Americas

    38 Canada’s cyber security in a globalized environment: challenges and opportunities (Kawser Ahmed)

    39 The United States: a declining hegemon in Cyberspace? (Mary Manjikian)

    40 Jamaica’s cybercrime and cyber-security: policies, laws, and strategies (Suzette A. Haughton)

    41 Mexico and cybersecurity: policies, challenges, and concerns (Saúl M. Rodríguez and Nicolás Velásquez)

    42 Colombia’s cybersecurity predicament: state making, strategic challenges and the cyberspace (Florent Frasson-Quenoz and Cesar Augusto Niño González)

    43 Cybersecurity Governance in Brazil: Keeping Silos or Building Bridges? Louise Marie Hurel and Luisa Cruz Lobato

    Part V: Africa

    44 Securitizing Cyber Space in Egypt: the Dilemma of Cybersecurity and Democracy (Bassant Hassib and Nardine Alnemr)

    45 Security through the Arab Winter: cyber strategies in postrevolutionary Tunisia (Nabil Ouassini)

    46 Cyber security in Kenya: balancing economic security and internet freedom (James D. Fielder)

    47 Cybersecurity policy in Nigeria: a tool for national security and economic prosperity (Adewunmi J. Falode)

    48 Cybersecurity in Ghana: past, present, and future (Anwar Ouassini and Mostafa Amini)

    49 Building a Cyber Fortress in Africa: uganda’s cyber security capacities and challenges (Scott N. Romaniuk and David Andrew Omona)

    50 Cybersecurity in South Africa: status, governance, and prospects (Raymond Steenkamp-Fonseca and Jo-Ansie van Wyk)

    51 Algorithms of oppression? aU’s cybersecurity policy and its enforcement in Africa (Joshua Oreoluwa Akintayo)

    Index

    Biography

    Scott N. Romaniuk is a Postdoctoral Research Fellow in Security Studies at the China Institute, University of Alberta, Canada, and a Visiting Fellow at the International Centre for Policing and Security, University of South Wales, UK.

    Mary Manjikian is Associate Dean of the Robertson School of Government at Regent University, USA.

    'To create this omnibus collection, Romaniuk (Univ. of Alberta) and Manjikian (Regent Univ.) gathered the most comprehensive possible set of essays on national cybersecurity policies. Each of the 51 chapters provides an up-to-date summary and analysis of a single country's cybersecurity situation and strategies. Hostile-state actors, online terrorists, organized criminal groups, black hat hackers, and other bad actors all must be countered through sophisticated advance planning. Defenders are generally at a significant disadvantage against their nimbler attackers. Policies vary according to how each nation defines and prioritizes the potential threats. An authoritarian government, for example, will be far more concerned with controlling politically sensitive information that might undermine the power of the ruling regime than a more democratic nation. A maritime country is likely to prioritize different defenses than one that is landlocked. Countries that were once parts of the former Soviet Union fear hybrid warfare attacks that might be launched from Russia. Although the individual essays provide fine summaries of the unique laws, political forces, and social dynamics obtaining in each nation discussed, the book as a whole would have been greatly enhanced by expanding the editors' nine-page introduction to further integrate the themes drawn from these diverse contributions.

    Summing Up: Recommended. Upper-division undergraduates. Graduate students, faculty, and professionals.'

    --T. H. Koenig, Northeastern University, Choice, December 2022