Browse > Article
http://dx.doi.org/10.13089/JKIISC.2018.28.5.1259

Cyber Security Governance Analysis in Major Countries and Policy Implications  

Joo, Moon-ho (Graduate School of Information Security, Korea University)
Kwon, Hun-Yeong (Graduate School of Information Security, Korea University)
Lim, Jong-in (Graduate School of Information Security, Korea University)
Abstract
This study analyzes cyber security strategies, laws, organizations, and the roles of the ministries in the US, Germany, UK, Japan, China, and Korea and draws implications for establishing a practical and efficient next generation national cyber security governance. Under this goal, this study analyzes cyber security strategies, laws, organizations, and the roles of the ministries in the US, Germany, UK, Japan, China, and Korea and draws implications for establishing a practical and efficient next generation national cyber security governance. Based on the results of this analysis, this study suggests suggestions and directions for improvement of domestic cyber security governance.
Keywords
Cybersecurity; Governance; Strategy; National Cybersecurity; Laws;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 Boannews(2018.04.17.), "Although the summit is approaching, the cyber attack, which is presumed to be North Korea, is ongoing". http://www.boannews.com/media/view.asp?idx=68529&kind=1
2 arsTECHNICA(2018.04.28.), "As two Koreas shake hands, Hidden Cobra hackers wage espionage compaign". https://arstechnica.com/tech-policy/2018/04/as-two-koreas-shake-hands-hidden-cobra-hackers-wage-espionage-campaign/
3 Stephen J. Cimbala & Roger N. McDermott, "A New Cold War? Missile Defenses, Nuclear Arms Reductions, and Cyber War", Comparative Strategy, pp.95-111, 2015
4 Sangbae Kim, "Cybersecurity Strategies of Major Powers in World Politics: From the Comparative Perspective of National Strategies", Journal of International and Area Studies, vol. 26, No. 3, pp.67-108, 2017
5 Deloitte, "2016 Deloitte Asia-Pacific Defense Outlook", 2016
6 Sangdon Park, Injung Kim, "A Study on Tasks for the Legal Imporvement for the Governance System in Cybersecurity", Convergence security journal, Vol. 13, No. 4, pp.1-3, 2013.
7 Korea Internet&Security Agency, "A Comparative Law Study on the Cybersecurity Response System", 2015
8 Ji-Hyun Kim, "Proposal of Cyber Security Control Tower System in view of Korea's Constitutional Law", Journal of Security Engineering, Vol. 11, No.1, pp.25-40, 2014   DOI
9 Sim, Kwang-ho, Lee, Cheouljoo, Park, Jae-Hyung, "Cyber Terror and Shadow Risk: A Study on the Design of Governance System for the National Cyber Security of Korea", The Journal of Political Science & Communication, Vo.16, No.1, pp.265-296, 2013
10 Jong-In Lim, "Cyber security policy proposal for the Hyper-connectivity society", Policy study of National Science and Technology Advisory Council, Vol. 2014, No. 5, 2014
11 The White House, "National Security Strategy", 2015.02.
12 The White House, "Cybersecurity National Action Plan", 2016.02. Homeland Security, "NATIONAL CYBER INCIDENT RESPONSE PLAN", 2016.12.
13 Homeland Security, "NATIONAL CYBER INCIDENT RESPONSE PLAN", 2016. 12.
14 Homeland Security, "Comprehensive National Cybersecurity Initiative", 2008.01.
15 European Commission, "Cybersecurity Strategy of the European Union : An Open, Ssfe and Secure Cyberspace", 2013.07.
16 European Parliament and of the Council, "Directive on Network Information Security", 2016.07.
17 Federal Ministry of the Interior, "Cyber Security Strategy for Germany", 2011.02.
18 Bundesministerium des Innern, "Cyber-Sicherheitsstrategie fur Deutschland", 2016.11.
19 Cabinet Office, "The UK Cyber Security Strategy 2011-2016", 2011.
20 The Department of Defense, "The DoD Cyber Strategy", 2015.04.
21 HM Government, "National Cyber Security Strategy 2016-2021", 2016.11.
22 HSCIC, "Health and Social Care Information Centre Strategy 2015-2020", 2015.03.
23 UK Cabinet Office, "A National Information Assurance Strategy", 2007.06.
24 務省,"識情報社会の実現に向けた情報通信政策の在り方", 2012. http://www.soumu.go.jp/main_content/000169616.pdf
25 Mikk Raud, "China and Cyber: Attitudes, Strategies, Organisation", CCDCOE, 2016
26 Information Security Policy Council, "Japan Cybersecurity Strategy : Towards a world-leading, resilient and vigorous cyberspace", 2013.06.10.
27 Cabinet Decision, "Japan Cybersecurity Strategy", 2015.10.04.
28 Ministry of Defense, "NATIONAL DEFENSE PROGRAM GUIDELINES for FY 2014 and beyond", 2013.12.17.
29 Youn Bonghan, "A Study on China's Cyber Security Legislation and Policy: Implications of China's New Cyber Security Law and Our Responses", Policy Study, Vol 189, 53p, 2016
30 Lindsay, Jon R., Tai Ming Cheung and Derek S. Reveron. "China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain". Oxford University Press, 2015.
31 Politburo Standing Committee, "National Cyberspace Security Strategy(國家网絡空間安全戰略)", 2016.12.
32 Ministry of Public Security, "China International strategy of Cooperation on Cyberspace", 2017.03.
33 Homeland Security, https://www.dhs.gov/national-cybersecurity-and-communications-integration-center
34 Yang. Jeong-yoon, Park. Sang-don, Kim. So-jeong, "Analysis on the U.S. Legislation Relating to Cybersecurity: Overview and Discussion of Five Acts Including National Cybersecurity Protection Act PDF icon", National Assembly Research Service, Vol 7, No.2, p.316, 2015
35 Senior National Assembly Intelligence Committee member, Review Report on the National Legislation and National Cyber Safety Management, p.3, 2014
36 Park Sangdon, "A Review on the Role Expansion of German Federal Office for Information Security(Bundesamt fur Sicherheit in der Informationstechnik, BSI) in 2017", Journal of Security Engineering, Vol.15, No.2, pp.69-80, 2018   DOI
37 EUROPEAN COMMISSION press release(2017.09.19.), "State of the Union 2017 - Cybersecurity: Commission scales up EU's response to cyber-attacks", Brussels. http://europa.eu/rapid/press-release_IP-17-3193_en.htm
38 Korea Internet Development Institute, National Institute of Security Technology, "2017 National Information Security White Paper", 2017