11.07.2015 Views

syssec_red_book

syssec_red_book

syssec_red_book

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

24.2. Strategic PrioritiesProposed Actions: The EC will ensure the implementation of cybercrimerelateddirectives and provide funding programs to support member states instrengthening their cybercrime combating capabilities. The EC will also supportthe cooperation between research/academia, law enforcement practitioners andthe private sector. The European Cybercrime Centre (EC3) should act as the focalpoint in the fight against cybercrime. Furthermore, the EC proposes to increasethe accountability of registrars of domain names and to ensure the accuracy ofinformation on website ownership. Europol should support the member states’cybercrime investigations, and produce strategic and operational reports ontrends, and target investigative action by cybercrime teams.3. Development of Cyberdefense Policy and Capabilities. In order toensure EU member states’ defense and national security interests, synergiesbetween civilian and military cyber security mechanisms shouldbe enhanced. The EC proposes to support these efforts by researchand development and closer cooperation between governments, the privatesector and academia as well as with international partners, such asNATO.Proposed Actions: The High Representative will assess cyberdefense requirementsand promote development of cyberdefense capabilities and technologies.The developed EU cyberdefense policy framework should include dynamic riskmanagement, improved threat analysis and information sharing. The High Representativewill promote the cooperation between civilian and military actors.4. Development of Industrial and Technological Resources. Hardwareand software components used in critical services and infrastructures, aswell as increasingly in mobile phones, need to be trustworthy and secure,and must protect personal data. Thus, the EC proposes (i) makingsecurity a priority for all actors in the value chain of cyber securityproducts and (ii) fostering research and development investments andinnovation. This should be achieved through the development of securitystandards, EU-wide voluntary certification schemes and the <strong>red</strong>uction ofEuropean dependence on foreign technologies.Proposed Actions: The EC will develop incentives and recommendations forthe adoption of secure ICT solutions and the take-up of good cyber securityperformance across the ICT value chain. The EC will further examine the possibilitiesfor providers of ICT components to report detected security-criticalvulnerabilities to national authorities. Public and private stakeholders shouldadopt security principles in their development process to ensure that new generationsof software and hardware have stronger, embedded and user-friendlysecurity features. EU member states should promote the involvement of industryand academia in developing and coordinating security solutions and should coor-143

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!