Cybersecurity
eBook - ePub

Cybersecurity

Public Sector Threats and Responses

  1. 392 pages
  2. English
  3. ePUB (mobile friendly)
  4. Available on iOS & Android
eBook - ePub

Cybersecurity

Public Sector Threats and Responses

Book details
Book preview
Table of contents
Citations

About This Book

The Internet has given rise to new opportunities for the public sector to improve efficiency and better serve constituents. But with an increasing reliance on the Internet, digital tools are also exposing the public sector to new risks. This accessible primer focuses on the convergence of globalization, connectivity, and the migration of public sector functions online. It examines emerging trends and strategies from around the world and offers practical guidance for addressing contemporary risks. It supplies an overview of relevant U.S. Federal cyber incident response policies and outlines an organizational framework for assessing risk.

Frequently asked questions

Simply head over to the account section in settings and click on “Cancel Subscription” - it’s as simple as that. After you cancel, your membership will stay active for the remainder of the time you’ve paid for. Learn more here.
At the moment all of our mobile-responsive ePub books are available to download via the app. Most of our PDFs are also available to download and we're working on making the final remaining ones downloadable now. Learn more here.
Both plans give you full access to the library and all of Perlego’s features. The only differences are the price and subscription period: With the annual plan you’ll save around 30% compared to 12 months on the monthly plan.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes, you can access Cybersecurity by Kim J. Andreasson in PDF and/or ePUB format, as well as other popular books in Business & Operations. We have over one million books available in our catalogue for you to explore.

Information

Publisher
CRC Press
Year
2011
ISBN
9781466551237
Edition
1
Subtopic
Operations

1

The Global Rise of E-Government and Its Security Implications

JEREMY MILLARD
Contents
Introduction
Web on the March
The Known Unknowns of Cybersecurity
Privacy
Trust
Data Security
Loss of Data Control
The Mother of All Known Unknowns—Human Behavior
Government Loses Control—Who Is Now in Charge and Why It Matters
Who Gets In and What Gets Out When Government Opens the Door?
Back to Basics: Trust, Transparency, and Accountability
How to Swim in an Ocean of Insecure Data
References

Introduction

The business of government is, at core, all about public sector data, information, and knowledge being created, altered, moved around, and deployed to meet the needs of society. E-government digitizes some or all of these processes and the outcomes produced, potentially transforming them in ways not always predicted or desired, whether for the internal operations of the public sector or for the users of public services and facilities. These unintended consequences can be problematic. For example, they can pose profound challenges to cybersecurity in terms of unauthorized access to, or use of, data and public sector information. Public sector managers need to be just as aware of these unintended consequences as they are of those they expect when e-government is introduced.
Now, do not misunderstand me. E-government is a very good thing and has many clear and documented benefits. For example, there is a lot of evidence that digitizing back-office processes can lead to significant cost savings for government through more efficient and rational processes, joining up administrations to share and save resources, better design and targeted services, and more intelligent and evidence-based policy development with greater impact. As illustrated in a 2011 article in the European Journal of ePractice, e-government also has a lot to offer in tackling the financial and economic crisis. In the front-office, e-government services undoubtedly provide users with better, more convenient, time-saving services, available 24-7. Digitization encourages transparency, openness, and participation, and provides tools for users to get involved in designing and consuming services more appropriate to their individual needs.
For example, a 2010 survey from Tech America, an information technology (IT) trade association, shows how federal agencies and departments in the United States have increased efforts to publish data sets and utilize social media tools as part of the Obama Administration’s push for transparency, yet continue to struggle with cybersecurity, IT infrastructure, and workforce issues. The shift toward a more open government has created threats as well as opportunities. According to the survey, some chief information officers (CIOs) see “millions of malicious attempts per day to access their networks”—from recreational hackers to sophisticated cyber-criminals.
This chapter illustrates some of the issues of moving public sector information online, showing that these have both direct and indirect ramifications across the large canvas of e-government areas often not considered. For example, many governments are making the mistake of trying to set security systems too high for the functionalities deployed, resulting in a waste of resources that could have been used to shore up more vulnerable systems. There have been many failed attempts to introduce sophisticated Public Key Infrastructure (PKI) and digital signature systems when simple passwords or PIN codes would suffice. The lesson is to take security and data protection extremely seriously and treat it as the most pressing technical challenge, but at the same time approach these issues incrementally and proportionally given that there is always a trade-off between increased security and usage. The approach to take is to build in security and data protection from the very start of any e-government initiative.

Web on the March

Since 2004 the evolution of the World Wide Web has moved from Web 1.0 (consisting of Internet websites and webpages, e-mail, instant messaging, short message service (SMS), simple online discussion, etc.) to Web 2.0 that also allows users to provide and manipulate content and get directly involved. Web 2.0 sites typically have an “architecture of participation” that encourages users to add value to the application as they use it, for example, through social media dialogue around user-generated content in a virtual community. There is also much discussion about the Web 3.0 evolution toward wide-scale ubiquitous seamless networks (sometimes called grid computing), networked and distributed computing, open ID, open semantic web, large-scale distributed databases, and artificial intelligence.
Some are also looking forward to Web 4.0 as the global semantic web (i.e., methods and technologies that allow machines to understand the meaning, or “semantics,” of information on the web), including the use of statistical, machine-constructed semantic tags and algorithms. According to Tim Berners-Lee, the “father” of the Internet, we are indeed on the verge of the age of the semantic web that exploits the Internet of data rather than the Internet of documents we now have. This will enable intelligent uses of the Internet like asking questions rather than simply searching for key words, as well as more automatic data exchanges between databases, data mining, and similar uses.
E-government is affected by the march of the web with increasing focus on the Government 2.0 paradigm. This concentrates much more on the demand side, on user empowerment and engagement, as well as on benefits and impacts that address specific societal challenges, rather than simply providing administrative services online.
This is to be achieved by supporting the real transformation of governance arrangements away from silo and government centricity toward becoming more user centric and user driven. As noted by Millard in 2010, users and other legitimate stakeholders are being invited more openly into a participative and empowering relationship with government in relation to service design and delivery, the workings and arrangements of the public sector and public governance more widely, as well as public policy and decision making.
To this effect, tremendous e-government progress has been made over the last 10 to 15 years during which time the use of information communication technology (ICT) in the public sector has moved from being largely a concern of separate ministries in digitizing their records and processes, to one where ICT is used to join up ministries, reengineer processes, and offer many new services to citizens and businesses. E-government has become a top priority for governments around the world and a major focus of investment. This can be measured in the steady growth of the supply-side availability of e-government services across all countries since 2000. For example, according to ongoing benchmarking reports led by Capgemini, a consultancy, full online availability of a basket of the most common 20 e-government services in Europe increased from 20% in 2001 to 82% in 2010, while online sophistication increased from 45% in 2001 to 90% in 2010. Globally, the 2010 UN benchmarking survey “finds that citizens are benefiting from more advanced e-service delivery, better access to information, more efficient government management and improved interactions with governments, primarily as a result of increasing use by the public sector of information and communications technology” (p. 59).
These developments point inexorably in the same direction. As the web marches on and data of all types and qualities become increasingly ubiquitous, the issues are not only about whether we can keep them secure but also about confronting profound issues about who owns the data, where they are, how accurate they are, and who is accountable for them.

The Known Unknowns of Cybersecurity

There is no doubt that the biggest operational challenge to e-government is cybersecurity, including threats to identity, privacy, and data systems.
Adequate privacy and data protection, and the trust these support, are crucial for reaping the benefits of e-government. If they are in place and work well, they can provide stable, predictable, and confidence-building frameworks. In fact, these are key for any activity using information and communications technology (ICT) across society, whether in the public, private, or civil sectors, so should not be seen in isolation. But if they are not, it can have negative effects on usage. According to the European Commission (2009, p. 1), “Only 12% of EU Web users feel safe making transactions on the Internet, while 39% of EU Internet users have major doubts about safety, and 42% do not dare carry out financial transactions online.” Ongoing news reports about lost credit card data and private information in both the private and public sectors are not likely to improve this image. For example, according to a November 2007 BBC News report, two password protected computer disks holding the personal details of all families in the United Kingdom with a child under 16, 25 million people in total, went missing. The package had not been recorded or registered and has never been found since being physically transported between two departments. This has been one incident among many severely questioning the way government handles sensitive data. There are also increasing numbers of malicious hacker attacks, financially motivated breaches, and even policy motivated efforts to shut off information, such as during the attacks on Estonia, the Iranian demonstrations in 2010, and the 2011 uprisings in the Middle East. We know a lot about the main cybersecurity threats, yet a lot less about how to meet them. As the foremost duty of government is to protect its citizens, the public sector must build highly effective and integrated systems to protect against crime, espionage, terrorism, and war in cyberspace.
Government’s response to cybersecurity issues has, however, generally lagged the private sector, despite it arguably being more important, and, according to a 2008 Organization for Economic Cooperation and Development (OECD) report, there is limited availability of data on public sector efforts. Even in highly advanced e-government countries like Norway, only a minority of public administrations have been offering secure ways of communicating with their websites, despite many surveys showing that fears of data insecurity are perceived by users as the biggest deterrent to their use of e-government. However, it is also worth noting that the cybersecurity response is highly variable, for example central governments are much more likely to have adequate measures in place than local, obviously reflecting the size of populations involved and the resources available. But many e-government services are provided at the local or regional levels and the amount of information provided by these entities is rapidly increasing. One of the challenges of cybersecurity in e-government is that the public sector is characterized by a large amount of operational independence and “siloization” among its various parts, something not seen in the private sector to the same extent.
Security in government’s cyberspace is thus of paramount concern, and it is clear that current systems, both organizational and technical, are not always meeting the challenge. Future solutions will also likely require solutions very different from those of today’s systems that are predicated on relatively stable, well-defined, consistent configurations, contexts, and participants in security arrangements. A new paradigm is probably needed characterized by “conformable” security, in which the degree and nature of security associated with any particular type of action will change over time, with changing circumstances and with changing available information. In this endeavor, it is likely that the public sector will have to deal with challenges in five areas: privacy, trust, data security, loss of data control, and human behavior.

Privacy

Cybersecurity initiatives need to consider privacy implications that in many cases can significantly compromise their likely efficacy. For example, privacy and data protection will need conformable security systems, adapted to the changing access needs and identities of people and organizations. These systems will also need to operate across national borders, which will require not just political agreements but also data structures and standards that are compatible. Data security will also be improved by giving users much greater control over their own data and their own (often) multiple identities, for example, through trusted third parties. For services that can operate across borders, well-functioning identity and authentication systems will be vital. Information assurance is also needed as a holistic approach incorporating risk management, given that no system can provide complete security. Long-term data preservation and access are also important given the fast-changing technical formats and the huge increases in data generation expected.
Privacy needs to be upheld, for example, through regulation and international agreements like the European Data Protection Framework, including appropriate data ombudsmen, custodians, or trusted third parties. Care should be taken to avoid “mission creep,” when data are used for purposes not originally intended, or the “race to the bottom” in interagency or cross-border data sharing by a reversion to the standards of the weakest member. User needs and trust must be built on an understanding of real human behavior when using data, as well as on technical requirements.

Trust

The technical aspect of cybersecurity may turn out to be the easy part. Clearly, understanding and catering for, what some call irrational or schizophrenic, human behavior can be a real challenge to cybersecurity.
Trust is a critical issue and is built through information minimalization (i.e., using as little data as possible to perform a task), and informing users or obtaining user consent when accessing and processing their data by enabling users to trace, own, or control their own data. Trust is also built by properly managing, explaining, and minimizing the risks of data loss or leakage. Trust is notoriously difficult to build but can be very quickly and devastatingly destroyed by one single breach. This underlines the need to consider trust as multidimensio...

Table of contents

  1. Cover
  2. Half Title
  3. Other
  4. Title Page
  5. Copyright Page
  6. Dedication
  7. Table of Contents
  8. Introduction
  9. The Editor
  10. Contributor Biographies (in Order of Appearance)
  11. Chapter 1 The Global Rise of E-Government and Its Security Implications
  12. Chapter 2 Understanding Cyber Threats
  13. Chapter 3 Cybersecurity in East Asia: Japan and the 2009 Attacks on South Korea and the United States
  14. Chapter 4 Toward a Global Approach to Cybersecurity
  15. Chapter 5 The Cybersecurity Policy Challenge: The Tyranny of Geography
  16. Chapter 6 U.S. Federal Cybersecurity Policy
  17. Chapter 7 European Cybersecurity Policy
  18. Chapter 8 A Local Cybersecurity Approach: The Case of Catalonia
  19. Chapter 9 Securing Government Transparency: Cybersecurity Policy Issues in a Gov 2.0 Environment and Beyond
  20. Chapter 10 The Civilian Cyber Incident Response Policies of the U.S. Federal Government
  21. Chapter 11 Cybersecurity Health Check: A Framework to Enhance Organizational Security
  22. Chapter 12 Beyond Public–Private Partnerships: Leadership Strategies for Securing Cyberspace
  23. Chapter 13 Is There a Conclusion to Cybersecurity?
  24. Index