04.11.2014 Views

thesis

thesis

thesis

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Conclusion 287<br />

by the Dutch government exemplify this; police forces would retain the right to<br />

hack into any machine involved in DDoS attacks or a botnet. A similar approach<br />

would be a mandate for OS and software providers to force-update or reconfigure<br />

their installed base.<br />

Conflicting norms structure the behaviour of members of the Internet security<br />

community. Introducing the nation state and its national security interests as<br />

points of reference in Internet security politics diverts the focus and loyalty of the<br />

community away from the goal of global infrastructural Internet security towards<br />

national interests and a parcelling of Internet security. As a consequence, Internet<br />

security becomes a patchwork rug of at times conflicting, at times complementary<br />

islands of national Internet securities. National Internet security requires a legally<br />

backed technical centralisation of the locus of authority. The normative idea of<br />

nationally responsible security hacking ensures the availability of required skills and<br />

marginalises progressive hacking scenes and their libertarian ideas.<br />

Among the drawbacks of the centralised, hierarchical approach is that the introduction<br />

of hierarchical and monetary incentives might crowd out the intrinsic motivations<br />

of contributors. If this happens before hierarchical and commercial<br />

institutions are fully established, the overall security situation would worsen. As a<br />

second draw-back, the set-up and maintenance costs of a centralised, hierarchical<br />

governance system are likely to be substantially higher than those of the social/networked<br />

approach. And last, but surely not least, the potential externalities<br />

of hierarchical and central Internet security governance would be substantial. From<br />

the perspective of democratic governance, the societal risks of letting traditional<br />

security organisation manage the security of the Internet appear to be significant.<br />

8.5.4 Strengthening its effectiveness<br />

An important way to increase the relevance of the networked approach is to increase<br />

its capabilities and effectiveness. This would remove political doubts regarding<br />

its ability to handle the increasing variety and number of security incidents.<br />

The technical integrity of the Internet resides in the hands of the Internet security<br />

community and the organisations connected to it by default. The technical staff of<br />

individual organisations and their ICT service suppliers ensure the functionality of<br />

their networks and systems. One can conceive a number of ways in which security<br />

provisioning in this networked approach could be improved (Rendon Group<br />

2011).

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!