Abstract
The rapid development of cyberspace in the recent two decades has introduced the new term cybersecurity as a follow-up of information security or IT security. Despite the rapid adoption of this new term, there exists a lot of confusion about its precise meaning, while – due the societal importance of it – there is a high need for a common understanding of what cybersecurity entails. This paper discusses a new framework of thinking where (i) cyberspace is being defined as the space of cyber activities (i.e., IT-enabled activities) and (ii) cybersecurity as the multidisciplinary (cyber) risk management challenge of securing cyberspace. As is argued, this new holistic conceptualization enables a common understanding and participation of all stakeholders in the current cybersecurity challenge.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
https://en.wikipedia.org/wiki/Information_security#cite_note-1 (last access April 10, 2017)
BSI, Information Technology – Code of Practice for Information Security Management. BS7799, part 1 (1995) and part 2 (1999).
ISO/IEC 27k-series: for an overview see Gary Hinson: http://www.iso27001security.com/ISO27k_Standards_listing.docx.
E-commerce, the dot,com bubble: see https://en.wikipedia.org/wiki/Dot-com_bubble (last access April 14, 2017)
https://en.wikipedia.org/wiki/History_of_mobile_phones (last access April 14, 2017)
Larry D. Welsch, Cyberspace the fifth operational domain, IDA Research Notes, 2011.
U. Beck, Risk Society: Towards a New Modernity, New Delhi, Sage, 1992.
Internet of Things (IoT): https://en.wikipedia.org/wiki/Internet_of_things, (last access April 14, 2017)
Kaspersky Labs’ Global Research & Analysis Team (GReAT),. The Great Bank Robbery: the Carbanak APT., 2015.
NCSC, ISAC’s, https://www.ncsc.nl/english/Cooperation/isacs.html (last access April 14, 2017)
Socio-technical system: https://en.wikipedia.org/wiki/Sociotechnical_system (last access April 14, 2017)
Cyberspace as ecosystem: http://itlaw.wikia.com/wiki/Cyber_ecosystem (last access April 14, 2017)
ISO 31000 series of risk management: https://en.wikipedia.org/wiki/ISO_31000 (last access April 14, 2017)
The Bowtie Method: https://www.cgerisk.com/support-a-downloads/support/bowtie-method-support/56-the-bowtie-method (last access April 14, 2017)
Fault tree analysis: https://en.wikipedia.org/wiki/Fault_tree_analysis (last access April 14, 2017)
Attack tree: https://en.wikipedia.org/wiki/Attack_tree (last access April 14, 2017)
Bayesian network: https://en.wikipedia.org/wiki/Bayesian_network (last access April 14, 2017)
Event tree analysis: https://en.wikipedia.org/wiki/Event_tree_analysis (last access April 14, 2017)
Stuxnet: https://en.wikipedia.org/wiki/Stuxnet (last access April 14, 2017)
L. Lessig, The Law of the Horse: What Cyberlaw Might Teach, 1999.
R. Anderson, Security Engineering, a guide to building dependable distributed systems, 2nd edition, Wiley, 2008.
Jajodia et al., Cyber Situational Awareness, Springer, 2010.
Executive MSc Program Cyber Security: https://www.csacademy.nl/en/education/education (last access April 14, 2017)
Jan van den Berg, Jacqueline van Zoggel, Mireille Snels, Mark van Leeuwen, Sergei Boeke, Leo van de Koppen, Jan van der Lubbe, Bibi van den Berg and Tony de Bos, On (the Emergence of) Cyber Security Science and its Challenges for Cyber Security Education, Proceedings of the NATO STO/IST-122 symposium in Tallinn, October 13–14 2014. (winner best conference paper award)
Acknowledgments
Many thanks go to my colleagues and students at TUDelft, Leiden University, and the Cyber Security Academy The Hague with whom I had so many discussions on the fascinating subject of cybersecurity. I’m very grateful to all of you.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Fachmedien Wiesbaden GmbH, ein Teil von Springer Nature
About this chapter
Cite this chapter
van den Berg, J. (2018). Cybersecurity for Everyone. In: Bartsch, M., Frey, S. (eds) Cybersecurity Best Practices. Springer Vieweg, Wiesbaden. https://doi.org/10.1007/978-3-658-21655-9_40
Download citation
DOI: https://doi.org/10.1007/978-3-658-21655-9_40
Published:
Publisher Name: Springer Vieweg, Wiesbaden
Print ISBN: 978-3-658-21654-2
Online ISBN: 978-3-658-21655-9
eBook Packages: Computer Science and Engineering (German Language)