Typology of the concept and main elements of cyberspace in national cyber security strategy of selected countries

Document Type : Original Article

Authors

1 Malek Ashtar university

2 Defense Industries Educational and Research Institute

3 phd student

Abstract

Organizations, centers and scientific and research institutions of different countries have provided various definitions for cyberspace and its main elements; The existence of relatively diverse definitions in our country has caused ambiguity, weak common language, complexity and inconsistencies in policy-making, planning and development of cyberspace and cyberspace security.
The present study was conducted with the aim of typology of the concept and main elements of cyberspace in the strategic documents of cyber security of countries. First, the evolution of different definitions of cyberspace from the perspective of global thinkers is reviewed, and then in this article, 39 national strategy (cyber security) documents from 34 countries, published during the last ten years from 2009 to 2019, are examined. Is. And with a qualitative approach and based on the method of content analysis, the main concepts and elements of cyberspace in these documents have been studied and extracted. As a result, 5 different types of concepts and four main elements of cyberspace have been extracted from these documents. Different are grouped according to this typology.
Based on the findings of this study, the four main elements of cyberspace include equipment, data, maps and operations, and 5 types of concepts extracted from these 39 documents are: cyberspace as an information and communication infrastructure, space Cyber as an information, communication and data infrastructure, cyberspace as a set of equipment, data and people, cyberspace as a set of equipment, data and operations, space Cyber as a comprehensive set of equipment, data, people and operations.

Keywords


  •  فهرست منابع و مآخذ فارسی

    • خلیلی، احمد. زبردست، اسفندیار و عزیزی، محمد مهدی، (زمستان 1396)، «گونه­شناسی سیاست­های مدیریت شهری در مناطق شهربنیان»، فصلنامه معماری و شهرسازی آرمان­شهر، شماره 21، 291-308.
    • دهقان اشکذری، محمدجواد. میرعمادی، طاهره و قاضی نوری، سید سپهر، (زمستان 1397)، «گونه­شناسی نظریه­های بین­المللی­سازی نظام­های نوآوری»، پژوهش­های مدیریت عمومی، سال یازدهم، شماره 42، 33-60.
    • کریمی قهرودی، محمدرضا و زارعی، وحید، (1399)، «حاکمیت فضای سایبری اندیشه­هایی پیرامون جامعه­ای با آینده مشترک در فضای سایبر»، انتشارات مؤسسه آموزشی و تحقیقاتی صنایع دفاعی، 75-125 .
    • کریمی قهرودی، محمدرضا و کیان­خواه، احسان، (تابستان 1394)، «چالش آفرینی اینترنت اشیا بر ارکان امنیت ملی کشور»، فصلنامه علمی امنیت ملی، سال چهارم، شماره شانزدهم، 81-106.
    • کیان­خواه، احسان، (زمستان 1398)، «چالش­های راهبردی حکمرانی با گسترش فضای سایبر»، فصلنامه علمی امنیت ملی، سال نهم، شماره سی­و­چهارم، 153-174.
    • لطیفی، میثم (زمستان 1397)، «روش­شناسی گونه­شناسی: رهنمونی بر نظریه­پردازی در دانش مدیریت»، فصلنامه مطالعات مدیریت دولتی ایران، دوره اول، شماره 2، 25-52.

     

     

    فهرست منابع و مآخذ انگلیسی

     

    • 26 Years After Gibson, Pentagon Defines ‘Cyberspace’. https://www. wired.com/2008/05/pentagon-define/ [2016-9-7].
    • afieldfile/2013/12/17/NSS.pdf [20 16-9-24].
    • pdf [2016-9-24].
    • Annex 1 to Government Decision No. 1139/2013 National Cyber Security Strategy of Hungary, 2013: 3. https://www.enisa.europa.eu/topics/national-cyber-security-strategies/ncss map/HU_NCSS.pdf [2016-9-4].
    • Austrian Cyber Security Strategy, 2013: 21. https://www.enisa.euro eu/topics/national-cybersecurity-strategies/ncss-map/AT_NCSS.pdf [2016-9-24].
    • Belgium, Cyber Security Strategy, 2012: 12. https://www.enisa.europa. eu/topics/national-cybersecurity-strategies/ncss-map/belgian-cyber-sec urity-strategy/at_download/file [2016-9-24].
    • Braun, viriginia and Clarke(2006)”using thematic analysis in psychology” Qualititative research , Vol.3 No.2:76-101 Retrived from: http:eprints.uwe.ac.//11735.
    • Canada’s Cyber Security Strategy, For a Stronger and More Prosperous Canada, 2010: 2. http://www.publicsafety.gc.ca/cnt/rsrcs/p blctns/cbr-scrt-strtgy/index-eng.aspx [2016-9-24].
    • Conceptual Views Regarding the Activities of the Armed Forces of the Russian Federation in the Information Space, p. 5. https://ccdcoe.org/ strategies/Russian_Federation_unofficial_translation.pdf ,2016.
    • Cyber Security Strategy for Germany, 2011: 9. http://www.cio.bund. de/SharedDocs/Publikationen/DE.
    • Cyber Security Strategy of Latvia 2014-2018, 2014.https://www.enisa. eu/topics/national-cyber-security-strategies/n css-map/lv-ncss [2016-9-24]. r%20Montenegro.pdf [2016-9-24].
    • Cyber Security Strategy of the United Kingdom: Safety, Security and Resilience in Cyber Space, 2009:7. https://www.gov.uk/government/ uploads/system/uploads/attachment_data/file/228841/7642.pdf [2016-24].
    • Cybersecurity Strategy: Towards a world-leading, resilient and vigorous cyberspace, 2013: 5. http://www.nisc.go.jp/active/kihon/pdf/ cybersecuritystrategy-en.pdf [2016-9-24].
    • Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure, 2009: III. https://ww smartgrid.gov/files/Cyberspace_Policy_Review _Assuring_ Trusted_ Resilient_Informat_200908.pdf [2016-9-24].
    • Cyberspace Protection Policy of the Republic of Poland, 2013: 5. https: //www.enisa.europa.eu/topics.
    • Cyberspace: Definition and Implications. https://ccdcoe.org/multime dia/cyberspace-definitionand-implications.html [2016-9-6].
    • Czech Republic, Draft Act on Cyber Security and Change of Related Acts (Act on Cyber Security), 2014: 2. https://www.govcert.cz/downlo ad/legislativa/container-nodeid-1168/draftactcybersecurity-130415.pdf [2016-12-31].
    • Denmark A, Mulvenon J (2010) Contested commons. Contested commons: the future of American power in a multi-polar world, pp 3-48. https://s3.amazonaws.com/files.cnas.org/documents/CNAS-Contest ed-Commons_1.pdf [2016-12-31].
    • Department of Communications, Notice of Intention to Make South African National Policy, 2010: 12. http://www.gov.za/sites/www.gov. za/files/32963_118_0.pdf [2016-9-24].
    • Developing National Information Security Strategy for the Kingdom of Saudi Arabia, NISS, DRAFT 7: A-http://www.itu.int/en/ITUD/Cybersecurity/Documents/National_Strategies_Repositoy/SaudiArabia_NISS_Draft_7_EN.pdf 2016-12-31].
    • Discussion on origin and translation of cyberspace. http://www.360doc. com/content/16/0115/19/21966267 _ 528220372.shtml [2016-12-31].
    • Finland´s Cyber Security Strategy. http://www.yhteiskunnanturvallisuus.fi/en/materials/doc_download/40-finlandas-cyber-security-strategy [2016-9-25].
    • Finland’s Cyber Security Strategy Government Resolution 24 Jan 2013. https://ccdcoe.org/cyberdefinitions .html [2016-9-10.
    • Government of Kenya Cybersecurity Strategy, 2014: 2. http://www.ict a.go.ke/wp-content/uploads/2014 /03/ GOK-national-cybersecurity-strat egy.pdf [2016-9-25].
    • Government of the Republic of Lithuania Resolution No. 796 of 29 June 2011 on the approval of the programme for the development of electronic information security (cyber-security) for 2011-2019, 2011: 3. https://www.itu.int/en/ITU-D/Cybersecurity/Documents/National Strategies _Repository/ Lithuania_ 2011_ EIS(KS)PP_796_2011-06-29_E pdf [2016-9-24].
    • Hotărârea nr. 271/2013 pentru aprobarea Strategiei de securitate Cibernetică a României şi a Planului de Acţiune la Nivel Naţional Privind Implementarea Sistemului Naţional de Securitate. Cibernetică,2013:7.https://www.enisa.europa.eu/topics/national-cyber-security-strategies/ncssmap/.
    • Information Systems Defence and Security: France’s Strategy, 2011: http://www.ssi.gouv.fr /uploads / IMG /pdf/2011-02-15_Information_ system_defence_and_security_-_France_s_strategy. pdf [2016-9-24].
    • International Organization for Standardization, ISO/IEC27032:2012, Information technology Security techniques - Guidelines for cyber security. https://www.iso.org/obp/ui/#iso:std:iso-iec:27032:ed-1:v1:en [2016-9-19].
    • Israel, Resolution No. 3611: Advancing National Cyberspace Capabilities, 2011: http://www.itu.int /en/ITU-D/Cybersecurity/Documents/National_Strategies_Repository/Israel_2011_Advancing%20National %20 Cyberspace%20Capabilities.pdf [2016-9-24].
    • Japan, National Security Strategy, 2013: 9.http://japan.kantei.go.jp/96_abe/documents/2013/__icsFiles.
    • Joint Publication 3-12(R): Cyberspace Operation. http://www.dtic.mil/ doctrine/new_pubs/jp3_12R.pdf [2016-9-5].
    • Ministry of Communication and Information Technolory, India, National Cyber Security Policy-2013 (NCSP-2013), 2013: 1. http:// gov.in/sites/upload_files/dit/files/National%20 Cyber%20Security %20Policy%20(1).pdf [2016-9-24].
    • National Cyber Security Strategy for Montenegro 2013-2017, 2013: 5. http://www.mid.gov.me/ ResourceManager/FileDownload.aspx?rid=165416&rType=2&file=Cyber%20Security%20Strategy%20fo.
    • National Cyber Security Strategy of Afghanistan, 2014.http://nic.af/Content/files/National %20Cybersecurity%20 Strategy%20of%20Afghanistan%20(November2014).pdf [2016-9-25].
    • National Cyberspace Security Strategy. http://www.cac.gov.cn/2016-12/27/c_1120195926.htm [2016].
    • National Initiative for Cybersecurity Careers and Studies, Explore Terms: A Glossary of Common Cybersecurity Terminology. https://def com/a/download/document/11128 [2016-9-24].
    • National strategy for the protection of Switzerland against cyber risks, 2012: 5. https://www.enisa.europa .eu / topics/national-cybersecuritystrategies/ncssmap/National_strategy_for_the protection_of_Switzerland.
    • national-cyber-security-strategies/ncss-map/copy_of_PO_NCSS.pdf [2016-9-24].
    • Netherlands, The Defence Cyber Strategy, 2012: 4. https://ccdcoe.org/ strategies/Defence_Cyber_Strategy_ NDL .pdf [2016-9-24].
    • New Zealand’s Cyber Security Strategy, 2011: 12. http://www.dpmc. nz/sites/all/files/publications/nz-cyber-security-strategy-june-2011 _0.pdf [2016-9-24].
    • Qatar National Cyber Security Strategy, 2014: 23. https://www.itu.int /en/ITU-D/Cybersecurity/Documents/National_Strategies_Repository/Qatar_2014_national_cyber_security_strategy.pdf [2016-9-25].
    • Rattray G, Evans C, Healey J. Chapter V: American security in the cyber commons. https://s3.amazonaws.com/files.cnas.org/documents/ CNAS-Contested-Commons_1.pdf [2016-12-31].
    • Republic of Colombia, National Planning Department, Policy Guidelins for Cybersecurity and Cyberdefense, 2011: 34. https://www.sites.oas.org/cyber/Documents/Colombia%20-%20National%20 Cybersecurity%20and%20Cyberdefense%20Policy.pdf [2016-9-24].
    • Series X: Data Networks, Open System Communications and Security. Telecommunication security. Overview of cybersecurity. http://www. itu.int/rec/T-REC-X.1205-200804-I [2016-12-31].
    • Some Principles of Cyber Strategy—Analysis—Eurasia Review. ISN Security Watch, 2014. http://maritimesecurity.asia/free-2/sea-lines-of-co mmunication/some-principles-of-cyber-strategyanalysis-eurasia-review/ [2016-9-6].
    • Spain, National Cyber Security Strategy, 2013: 9. https://www.enisa. eu/topics/nationalcyber-security-strategies/ncssmap/NCSS_ESe n.pdf [2016-9-24].
    • Strate L (1999) The varieties of cyberspace: problems in definition and delimitation. Western J Commun 63(3):382–412].
    • StrategiaDeSecuritateCibernetica%20ARomaniei.pdf [2016-12-31].
    • Strategische-Themen/css_engl_download.pdf? __blob=publicationFile [2016-9-24].
    • The NATO Cooperative Cyber Defence Centre of Excellence, Tallinn Manual on the International Law Applicable to Cyber Warfare, 2013: 211. http://www.jku.at/intlaw/content/e275831/e275836/e276629/Talli pdf [2016-9-.
    • Turkey, National Cyber Security Strategy and 2013–2014 Action Plan, 2013: 8. https://www.enisa.europa.eu/topics/national-cyber-security-str ategies/ncss-map/national-cybersecurity-strategyand-2013-2014-action -plan/at_download/file [2016-9-24].
    • United Kingdom, The UK Cyber Security Strategy: Protecting and Promoting the UK in a Digital World, 2011:11. https://www.gov.uk/ government/uploads/system/uploads/attachment_data/file/60961/uk-cy ber-security-strategy-final.pdf [2016-9-24].
    • White House, and United States of America. The National Strategy to Secure https://www.us-cert.gov/sites/default/files/publicat ions/cyberspace_strategy.pdf [2016-9-17].
    • Wiener N (1948) Cybernetics or control and communication in the animal and the machine, Vol 25. MIT press. http://www.allen-riley.com/ utopia/cybernetics.pdf [2016-9-24].
    • William G (1984) Neuromancer, Vol 4. Phantasia Press Edition, Bloomfield, MI. http://www.taodocs .com/p- 4046079.html [2016-12-31].
    • William G. BURNING CHROME. http://dinhe.net/*aredridel/.notmine /www.digipromo.com/vruz/ebooks /scifi/William%20Gibson-Burning %20Chrome.rtf [2016-11-30].
    • Wolff HVH (2013) Territorial sovereignty and neutrality in cyberspace. Intl L Stud Ser US Naval War 89:i. https://www.usnwc. edu/getattachment/ff9537ce-94d6-49a8- 51e335126c1e/vonHeinegg.aspx [2016-9-24].
    • Wolff HVH (2013) Territorial sovereignty and neutrality in cyberspace. Intl L Stud Ser US Naval War 89:i. https://www.usnwc. edu/getattachment/ff9537ce-94d6--a9ef-51e335126c1e/vonHeine aspx[2016-9-24].
    • Yannakogeorgos P (2009) Technogeopolitics of militarization and security in cyberspace. https://rucore.libraries.rutgers.edu/rutgers-lib/2 6118/PDF/1/ [2016-9-24].
    • Концепция Стратегии Кибербезопасности Российской Федерации, p. 2. http://council.gov.ru/media/ files/41d4b3dfbdb25cea8a73.pdf [2016-9-24].